| ID |
CVE-2026-3189
|
| Sažetak |
A weakness has been identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. This vulnerability affects unknown code of the file /api/admin/common/files/download. Executing a manipulation of the argument url can lead to server-side request forgery. The attack can be executed remotely. Attacks of this nature are highly complex. It is stated that the exploitability is difficult. Upgrading to version 1.3.3-beta is able to resolve this issue. This patch is called aefaabfd7527188bfba3c8c9eee17c316d094802. Upgrading the affected component is advised. The project was informed beforehand and acted very professional: "We have added a URL protocol whitelist validation to the file download interface, allowing only http and https protocols." |
| Reference |
|
| CVSS |
| Base: | 2.1 |
| Impact: | 2.9 |
| Exploitability: | 3.9 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
SINGLE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| PARTIAL |
NONE |
NONE |
|
| CVSS vektor |
AV:N/AC:H/Au:S/C:P/I:N/A:N |
| Zadnje važnije ažuriranje |
27-02-2026 - 14:06 |
| Objavljeno |
25-02-2026 - 17:25 |