CVE-2021-38241 - Ruoyi硬编码密钥导致Shiro反序列化
Deserialization issue discovered in Ruoyi before 4.6.1 allows remote attackers to run arbitrary code via weak cipher in Shiro framework.
Ruoyi management system uses the Shiro framework, but uses the default key, which allows attackers to use the Shiro deserialization vulnerability for remote command execution.
[VulnerabilityType Other]
RCE (Remote command execution)
[Vendor of Product]
Ruoyi https://gitee.com/y_project/RuoYi
[Affected Product Code Base]
Ruoyi管理系统 < 4.6.1 - All versions
[Attack Type]
Remote
[Impact Code execution]
true
[Attack Vectors]
Shiro deserialization's poc is effective.Use AES GCM's poc.
[Reference]
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4437
http://www.ruoyi.vip/
https://gitee.com/y_project/RuoYi
[Discoverer]
du1ge