CVE-2022-32065: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.
References
- gitee.com/y_project/RuoYi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6
- gitee.com/y_project/RuoYi/issues/I57IME
- github.com/advisories/GHSA-6w2f-6wq3-rjvf
- github.com/yangzongzhuan/RuoYi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6
- github.com/yangzongzhuan/RuoYi/issues/118
- nvd.nist.gov/vuln/detail/CVE-2022-32065
Detect and mitigate CVE-2022-32065 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →