Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Select an option

  • Save Paxsizy/cd1557aeba8093a8650601c4dbffb6f9 to your computer and use it in GitHub Desktop.

Select an option

Save Paxsizy/cd1557aeba8093a8650601c4dbffb6f9 to your computer and use it in GitHub Desktop.
CVE-2025-51743 CVE-2025-51744 CVE-2025-51745 CVE-2025-51746
---------------------------------------------------------------
> [VulnerabilityType Other]
>> Java deserialization vulnerability
---------------------------------------------------------------
> [Affected Component]
>> /user/addUser can be used to perform fastjson
>> deserialization attacks
---------------------------------------------------------------
> [Attack Type]
>> Remote
---------------------------------------------------------------
> [Impact Code execution]
>> true
---------------------------------------------------------------
> [Attack Vectors]
>> Details are on my blog: https://blog.hackpax.top/jsh-erp3/
---------------------------------------------------------------
> [Discoverer]
>> Paxsizy
---------------------------------------------------------------
> [Reference]
>> https://blog.hackpax.top/jsh-erp3/
>> https://gitee.com/jishenghua
>> https://gitee.com/jishenghua/JSH_ERP
---------------------------------------------------------------
> [Vendor of Product]
>> https://gitee.com/jishenghua
---------------------------------------------------------------
> [Affected Product Code Base]
>> https://gitee.com/jishenghua/JSH_ERP <= 2.3.1
---------------------------------------------------------------
Use CVE-2025-51744 for:
** RESERVED ** An issue was discovered in jishenghua JSH_ERP 2.3.1. The /user/addUser endpoint is vulnerable to fastjson deserialization attacks.
---------------------------------------------------------------
> [VulnerabilityType Other]
>> Java deserialization vulnerability
---------------------------------------------------------------
> [Affected Component]
>> /role/addcan be used to perform fastjson deserialization
>> attacks
---------------------------------------------------------------
> [Attack Type]
>> Remote
---------------------------------------------------------------
> [Impact Code execution]
>> true
---------------------------------------------------------------
> [Attack Vectors]
>> Details are on my blog: https://blog.hackpax.top/jsh-erp4/
---------------------------------------------------------------
> [Discoverer]
>> Paxsizy
---------------------------------------------------------------
> [Reference]
>> https://blog.hackpax.top/jsh-erp4/
>> https://gitee.com/jishenghua
>> https://gitee.com/jishenghua/JSH_ERP
---------------------------------------------------------------
> [Vendor of Product]
>> https://gitee.com/jishenghua
---------------------------------------------------------------
> [Affected Product Code Base]
>> https://gitee.com/jishenghua/JSH_ERP <= 2.3.1
---------------------------------------------------------------
Use CVE-2025-51745 for:
** RESERVED ** An issue was discovered in jishenghua JSH_ERP 2.3.1. The /role/addcan endpoint is vulnerable to fastjson deserialization attacks.
---------------------------------------------------------------
> [VulnerabilityType Other]
>> Java deserialization vulnerability
---------------------------------------------------------------
> [Affected Component]
>> /serialNumber/addSerialNumber can be used to perform
>> fastjson deserialization attacks
---------------------------------------------------------------
> [Attack Type]
>> Remote
---------------------------------------------------------------
> [Impact Code execution]
>> true
---------------------------------------------------------------
> [Attack Vectors]
>> Details are on my blog: https://blog.hackpax.top/jsh-erp5/
---------------------------------------------------------------
> [Discoverer]
>> Paxsizy
---------------------------------------------------------------
> [Reference]
>> https://blog.hackpax.top/jsh-erp5/
>> https://gitee.com/jishenghua
>> https://gitee.com/jishenghua/JSH_ERP
---------------------------------------------------------------
> [Vendor of Product]
>> https://gitee.com/jishenghua
---------------------------------------------------------------
> [Affected Product Code Base]
>> https://gitee.com/jishenghua/JSH_ERP <= 2.3.1
---------------------------------------------------------------
Use CVE-2025-51746 for:
** RESERVED ** An issue was discovered in jishenghua JSH_ERP 2.3.1. The /serialNumber/addSerialNumber endpoint is vulnerable to fastjson deserialization attacks.
---------------------------------------------------------------
> [VulnerabilityType Other]
>> Java deserialization vulnerability
---------------------------------------------------------------
> [Affected Component]
>> /organization/addOrganization can be used to perform
>> fastjson deserialization attacks
---------------------------------------------------------------
> [Attack Type]
>> Remote
---------------------------------------------------------------
> [Impact Code execution]
>> true
---------------------------------------------------------------
> [Attack Vectors]
>> Details are on my blog: https://blog.hackpax.top/jsh-erp6/
---------------------------------------------------------------
> [Has vendor confirmed]
>> true
---------------------------------------------------------------
> [Discoverer]
>> Paxsizy
---------------------------------------------------------------
> [Reference]
>> https://blog.hackpax.top/jsh-erp6/
>> https://gitee.com/jishenghua
>> https://gitee.com/jishenghua/JSH_ERP
---------------------------------------------------------------
> [Vendor of Product]
>> https://gitee.com/jishenghua
---------------------------------------------------------------
> [Affected Product Code Base]
>> https://gitee.com/jishenghua/JSH_ERP <= 2.3.1
---------------------------------------------------------------
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment