CVE-2024-43028
Published: 01 April 2026
Description
A command injection vulnerability in the component /jmreport/show of jeecg boot v3.0.0 to v3.5.3 allows attackers to execute arbitrary code via a crafted HTTP request.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2024-43028 by identifying, prioritizing, and applying patches or workarounds for the command injection flaw in Jeecg Boot's /jmreport/show component.
Prevents command injection exploitation by validating and sanitizing untrusted HTTP inputs to the vulnerable /jmreport/show endpoint.
Enforces authentication and authorization requirements to block unauthenticated remote access to the vulnerable /jmreport/show component.
Security SummaryAI
CVE-2024-43028 is a command injection vulnerability (CWE-77) affecting the /jmreport/show component in Jeecg Boot versions 3.0.0 through 3.5.3. It enables attackers to execute arbitrary code by sending a crafted HTTP request to the vulnerable endpoint. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact remote exploitation.
Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants remote code execution on the affected server, potentially allowing full system compromise, data theft, or further lateral movement within the environment.
Mitigation details and additional technical information are available in the referenced advisories, including a GitHub Gist at https://gist.github.com/aqyoung/e3b7ba5d8b8261df7d09931dbe779b3b and a Baidu Pan share at https://pan.baidu.com/s/1h2RGEvxuvsKtsn2-TlFlmA?pwd=gf5r. Security practitioners should review these for patch availability or workarounds specific to Jeecg Boot deployments.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated command injection in public-facing web component enables remote exploitation (T1190) leading to arbitrary OS command execution via Unix Shell (T1059.004).