CVE-2025-15124

3.1 LOW

📋 TL;DR

This vulnerability in JeecgBoot allows attackers to bypass authorization checks by manipulating the departId parameter in the /sys/sysDepartPermission/list endpoint. It enables unauthorized access to department permission data. Organizations using JeecgBoot up to version 3.9.0 are affected.

💻 Affected Systems

Products:
  • JeecgBoot
Versions: Up to 3.9.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /sys/sysDepartPermission/list endpoint specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive department permission data, potentially leading to privilege escalation or unauthorized data exposure.

🟠

Likely Case

Unauthorized viewing of department permission information, which could be used for reconnaissance or planning further attacks.

🟢

If Mitigated

Minimal impact with proper authentication and authorization controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploit is publicly available but requires authentication and specific parameter manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to versions beyond 3.9.0 if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Authorization Check

all

Add server-side validation for departId parameter and verify user has proper authorization to access requested department data.

Endpoint Access Restriction

all

Restrict access to /sys/sysDepartPermission/list endpoint to only authorized users with specific roles.

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block suspicious parameter manipulation attempts.
  • Monitor access logs to /sys/sysDepartPermission/list endpoint for unusual patterns.

🔍 How to Verify

Check if Vulnerable:

Test if unauthorized users can access department permission data by manipulating departId parameter in requests to /sys/sysDepartPermission/list.

Check Version:

Check JeecgBoot version in application configuration or about page.

Verify Fix Applied:

Verify that proper authorization checks are enforced and unauthorized parameter manipulation no longer returns sensitive data.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts to /sys/sysDepartPermission/list
  • Unusual parameter values in departId field

Network Indicators:

  • HTTP requests to /sys/sysDepartPermission/list with manipulated parameters

SIEM Query:

source="web_server" AND url="/sys/sysDepartPermission/list" AND (parameter.departId!="expected_value" OR status_code=200 AND user_role!="authorized_role")

🔗 References

📤 Share & Export