CVE-2025-7785

4.3 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in JeeSite's SSO controller that allows attackers to redirect users to malicious websites. The vulnerability affects JeeSite versions up to 5.12.0 and can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • thinkgem JeeSite
Versions: up to 5.12.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the SSO functionality specifically in the SsoController.java file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to phishing sites that steal credentials or deliver malware, potentially leading to account compromise or system infection.

🟠

Likely Case

Attackers use the redirect for phishing campaigns, tricking users into visiting malicious sites that appear legitimate.

🟢

If Mitigated

With proper input validation and URL whitelisting, the redirect would be blocked or validated before execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been publicly disclosed and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 3d06b8d009d0267f0255acc87ea19d29d07cedc3

Vendor Advisory: https://github.com/thinkgem/jeesite5/commit/3d06b8d009d0267f0255acc87ea19d29d07cedc3

Restart Required: Yes

Instructions:

1. Update to the latest JeeSite version or apply commit 3d06b8d009d0267f0255acc87ea19d29d07cedc3. 2. Restart the application server. 3. Verify the fix by testing redirect functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to only allow redirects to trusted domains

Implement custom filter in web.xml or Spring Security configuration to validate redirect URLs

Disable SSO Redirect Parameter

all

Temporarily disable or restrict the redirect parameter functionality

Modify SsoController.java to remove or hardcode redirect parameter

🧯 If You Can't Patch

  • Implement WAF rules to block malicious redirect URLs
  • Deploy network monitoring to detect suspicious redirect patterns

🔍 How to Verify

Check if Vulnerable:

Test the SSO endpoint with a malicious redirect parameter (e.g., ?redirect=http://evil.com) and check if it redirects

Check Version:

Check pom.xml or application properties for JeeSite version, or use: java -jar your-app.jar --version

Verify Fix Applied:

After patching, test the same malicious redirect parameter - it should be blocked or validated

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in access logs
  • Requests with external domains in redirect parameters

Network Indicators:

  • HTTP 302 redirects to unexpected external domains
  • Suspicious referrer patterns

SIEM Query:

http.status_code=302 AND url.query CONTAINS "redirect=" AND NOT url.destination IN (trusted_domains)

🔗 References

📤 Share & Export