Created
November 23, 2025 08:37
-
-
Save Paxsizy/cd1557aeba8093a8650601c4dbffb6f9 to your computer and use it in GitHub Desktop.
CVE-2025-51743 CVE-2025-51744 CVE-2025-51745 CVE-2025-51746
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| --------------------------------------------------------------- | |
| > [VulnerabilityType Other] | |
| >> Java deserialization vulnerability | |
| --------------------------------------------------------------- | |
| > [Affected Component] | |
| >> /user/addUser can be used to perform fastjson | |
| >> deserialization attacks | |
| --------------------------------------------------------------- | |
| > [Attack Type] | |
| >> Remote | |
| --------------------------------------------------------------- | |
| > [Impact Code execution] | |
| >> true | |
| --------------------------------------------------------------- | |
| > [Attack Vectors] | |
| >> Details are on my blog: https://blog.hackpax.top/jsh-erp3/ | |
| --------------------------------------------------------------- | |
| > [Discoverer] | |
| >> Paxsizy | |
| --------------------------------------------------------------- | |
| > [Reference] | |
| >> https://blog.hackpax.top/jsh-erp3/ | |
| >> https://gitee.com/jishenghua | |
| >> https://gitee.com/jishenghua/JSH_ERP | |
| --------------------------------------------------------------- | |
| > [Vendor of Product] | |
| >> https://gitee.com/jishenghua | |
| --------------------------------------------------------------- | |
| > [Affected Product Code Base] | |
| >> https://gitee.com/jishenghua/JSH_ERP <= 2.3.1 | |
| --------------------------------------------------------------- | |
| Use CVE-2025-51744 for: | |
| ** RESERVED ** An issue was discovered in jishenghua JSH_ERP 2.3.1. The /user/addUser endpoint is vulnerable to fastjson deserialization attacks. | |
| --------------------------------------------------------------- | |
| > [VulnerabilityType Other] | |
| >> Java deserialization vulnerability | |
| --------------------------------------------------------------- | |
| > [Affected Component] | |
| >> /role/addcan be used to perform fastjson deserialization | |
| >> attacks | |
| --------------------------------------------------------------- | |
| > [Attack Type] | |
| >> Remote | |
| --------------------------------------------------------------- | |
| > [Impact Code execution] | |
| >> true | |
| --------------------------------------------------------------- | |
| > [Attack Vectors] | |
| >> Details are on my blog: https://blog.hackpax.top/jsh-erp4/ | |
| --------------------------------------------------------------- | |
| > [Discoverer] | |
| >> Paxsizy | |
| --------------------------------------------------------------- | |
| > [Reference] | |
| >> https://blog.hackpax.top/jsh-erp4/ | |
| >> https://gitee.com/jishenghua | |
| >> https://gitee.com/jishenghua/JSH_ERP | |
| --------------------------------------------------------------- | |
| > [Vendor of Product] | |
| >> https://gitee.com/jishenghua | |
| --------------------------------------------------------------- | |
| > [Affected Product Code Base] | |
| >> https://gitee.com/jishenghua/JSH_ERP <= 2.3.1 | |
| --------------------------------------------------------------- | |
| Use CVE-2025-51745 for: | |
| ** RESERVED ** An issue was discovered in jishenghua JSH_ERP 2.3.1. The /role/addcan endpoint is vulnerable to fastjson deserialization attacks. | |
| --------------------------------------------------------------- | |
| > [VulnerabilityType Other] | |
| >> Java deserialization vulnerability | |
| --------------------------------------------------------------- | |
| > [Affected Component] | |
| >> /serialNumber/addSerialNumber can be used to perform | |
| >> fastjson deserialization attacks | |
| --------------------------------------------------------------- | |
| > [Attack Type] | |
| >> Remote | |
| --------------------------------------------------------------- | |
| > [Impact Code execution] | |
| >> true | |
| --------------------------------------------------------------- | |
| > [Attack Vectors] | |
| >> Details are on my blog: https://blog.hackpax.top/jsh-erp5/ | |
| --------------------------------------------------------------- | |
| > [Discoverer] | |
| >> Paxsizy | |
| --------------------------------------------------------------- | |
| > [Reference] | |
| >> https://blog.hackpax.top/jsh-erp5/ | |
| >> https://gitee.com/jishenghua | |
| >> https://gitee.com/jishenghua/JSH_ERP | |
| --------------------------------------------------------------- | |
| > [Vendor of Product] | |
| >> https://gitee.com/jishenghua | |
| --------------------------------------------------------------- | |
| > [Affected Product Code Base] | |
| >> https://gitee.com/jishenghua/JSH_ERP <= 2.3.1 | |
| --------------------------------------------------------------- | |
| Use CVE-2025-51746 for: | |
| ** RESERVED ** An issue was discovered in jishenghua JSH_ERP 2.3.1. The /serialNumber/addSerialNumber endpoint is vulnerable to fastjson deserialization attacks. | |
| --------------------------------------------------------------- | |
| > [VulnerabilityType Other] | |
| >> Java deserialization vulnerability | |
| --------------------------------------------------------------- | |
| > [Affected Component] | |
| >> /organization/addOrganization can be used to perform | |
| >> fastjson deserialization attacks | |
| --------------------------------------------------------------- | |
| > [Attack Type] | |
| >> Remote | |
| --------------------------------------------------------------- | |
| > [Impact Code execution] | |
| >> true | |
| --------------------------------------------------------------- | |
| > [Attack Vectors] | |
| >> Details are on my blog: https://blog.hackpax.top/jsh-erp6/ | |
| --------------------------------------------------------------- | |
| > [Has vendor confirmed] | |
| >> true | |
| --------------------------------------------------------------- | |
| > [Discoverer] | |
| >> Paxsizy | |
| --------------------------------------------------------------- | |
| > [Reference] | |
| >> https://blog.hackpax.top/jsh-erp6/ | |
| >> https://gitee.com/jishenghua | |
| >> https://gitee.com/jishenghua/JSH_ERP | |
| --------------------------------------------------------------- | |
| > [Vendor of Product] | |
| >> https://gitee.com/jishenghua | |
| --------------------------------------------------------------- | |
| > [Affected Product Code Base] | |
| >> https://gitee.com/jishenghua/JSH_ERP <= 2.3.1 | |
| --------------------------------------------------------------- |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment