Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
efw4.X: readonly Flag Not Enforced Server-Side
Vulnerability Description
efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the readonly flag set on the <efw:elFinder> JSP tag is intended to prevent file modifications. When protected=true, elfinder_checkRisk enforces that the client sends readonly=true (matching the session value), but no event handler checks the readonly value before performing write operations. The flag only controls client-side UI elements (disabling buttons) and response metadata (write: 0, locked: 1). An attacker who sends requests directly (bypassing the UI) can perform all file operations despite readonly=true. This vulnerability is fixed in 4.08.010.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Vulnerability Type
授权机制不正确
Vulnerability Title
EFW Framework 安全漏洞
Vulnerability Description
EFW Framework是efw group开源的一个基于Ajax和服务端JavaScript的企业级Web开发框架。 EFW Framework 4.08.010之前版本存在安全漏洞,该漏洞源于readonly标志仅控制客户端UI元素,未在事件处理程序中检查,可能导致绕过只读限制执行文件操作。
CVSS Information
N/A
Vulnerability Type
N/A