An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-32065.json"
[
{
"digest": {
"line_hashes": [
"310735121276722192299964965078095811308",
"19825365431255629273863119302958106262",
"17620255423507479804665933896277492101",
"177061473010337358847418197963668565444"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "ruoyi-common/src/main/java/com/ruoyi/common/exception/file/InvalidExtensionException.java"
},
"signature_type": "Line",
"id": "CVE-2022-32065-1f6497b5",
"source": "https://github.com/yangzongzhuan/ruoyi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6",
"deprecated": false
},
{
"digest": {
"function_hash": "19694962469981967058057745653945381299",
"length": 254.0
},
"signature_version": "v1",
"target": {
"file": "ruoyi-common/src/main/java/com/ruoyi/common/exception/file/InvalidExtensionException.java",
"function": "InvalidExtensionException"
},
"signature_type": "Function",
"id": "CVE-2022-32065-ea6498e2",
"source": "https://github.com/yangzongzhuan/ruoyi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6",
"deprecated": false
},
{
"digest": {
"line_hashes": [
"308272054755351381330280188361592092298",
"289420847547964015586167853056887380008",
"325028111115640944857999938457945223063",
"26098085904496894713601902342107620793",
"199910151512973175914405372321547223358",
"208303185908374213977017827837748836085",
"228921750470304584584691816023617311777",
"1587371070581513123018065685179950415"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "ruoyi-admin/src/main/java/com/ruoyi/web/controller/system/SysProfileController.java"
},
"signature_type": "Line",
"id": "CVE-2022-32065-f2c4b81c",
"source": "https://github.com/yangzongzhuan/ruoyi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6",
"deprecated": false
},
{
"digest": {
"function_hash": "113941333650743521420454907298250772311",
"length": 491.0
},
"signature_version": "v1",
"target": {
"file": "ruoyi-admin/src/main/java/com/ruoyi/web/controller/system/SysProfileController.java",
"function": "updateAvatar"
},
"signature_type": "Function",
"id": "CVE-2022-32065-fda625e8",
"source": "https://github.com/yangzongzhuan/ruoyi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6",
"deprecated": false
}
]