CVE-2025-8963

6.3 MEDIUM

📋 TL;DR

A remote deserialization vulnerability exists in jeecgboot JimuReport up to version 2.1.1, specifically in the Data Large Screen Template component's /drag/onlDragDataSource/testConnection endpoint. This allows attackers to execute arbitrary code on affected systems by sending specially crafted requests. Organizations using JimuReport versions up to 2.1.1 are vulnerable.

💻 Affected Systems

Products:
  • jeecgboot JimuReport
Versions: Up to and including version 2.1.1
Operating Systems: All platforms running JimuReport
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the Data Large Screen Template component specifically. All deployments with this component enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Remote code execution allowing attackers to deploy malware, establish persistence, and exfiltrate sensitive data.

🟢

If Mitigated

Limited impact if network segmentation and proper access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

While no public exploit exists, deserialization vulnerabilities are frequently weaponized. The vendor has confirmed the issue and provided a fix.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.1.1 (specific version not specified in references)

Vendor Advisory: https://github.com/jeecgboot/jimureport/issues/4010

Restart Required: No

Instructions:

1. Upgrade JimuReport to version after 2.1.1. 2. Verify the /drag/onlDragDataSource/testConnection endpoint is no longer vulnerable. 3. Test application functionality after upgrade.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Restrict access to the vulnerable /drag/onlDragDataSource/testConnection endpoint using web application firewall or network controls.

WAF rule: Block requests to */drag/onlDragDataSource/testConnection*
nginx/apache config: location ~ ^/drag/onlDragDataSource/testConnection { deny all; }

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate JimuReport instances from critical systems
  • Deploy web application firewall with rules to detect and block deserialization attack patterns

🔍 How to Verify

Check if Vulnerable:

Check if JimuReport version is 2.1.1 or earlier and if the /drag/onlDragDataSource/testConnection endpoint is accessible.

Check Version:

Check application configuration files or admin interface for version information

Verify Fix Applied:

After upgrade, verify the version is above 2.1.1 and test that the vulnerable endpoint no longer accepts malicious deserialization payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /drag/onlDragDataSource/testConnection
  • Java deserialization errors in application logs
  • Unexpected process execution from JimuReport

Network Indicators:

  • HTTP POST requests to /drag/onlDragDataSource/testConnection with serialized Java objects
  • Outbound connections from JimuReport to unknown external IPs

SIEM Query:

source="jimureport" AND (url="/drag/onlDragDataSource/testConnection" OR message="*deserialization*")

🔗 References

📤 Share & Export