A recently discovered security vulnerability in Jeecg-boot v3.4.3, named CVE-2022-45210, is making headlines due to its potential to allow malicious attackers to conduct SQL injection attacks. The vulnerability exists within the /sys/user/deleteRecycleBin component and, if exploited, can jeopardize sensitive data and compromise the integrity of affected applications. This blog post will discuss the details of the exploit, provide code snippets, link to original references, and suggest possible mitigation strategies to help affected parties protect themselves.

Exploit Details

The SQL injection vulnerability was found in Jeecg-boot v3.4.3, a popular and widely used open-source rapid development platform. It affects the /sys/user/deleteRecycleBin component of the application, which is responsible for handling the deletion of users' files and data.

An attacker can exploit this vulnerability by crafting a specially designed payload with malicious SQL commands and sending it to the vulnerable endpoint. This malicious query would then be executed by the application without proper validation and can potentially result in unauthorized access and manipulation of the underlying database and the application's data.

Here's a code snippet that shows the affected component

public class SysUserController {
  @RequestMapping(value = "/deleteRecycleBin", method = RequestMethod.DELETE)
  public Result<?> deleteRecycleBin(@ApiParam(name="ids",value="用户ID,多个以英文逗号隔开")@RequestParam(name="ids",required=true) String ids) {
    // The following line is vulnerable to SQL injection:
    return Result.ok("删除成功!");

The problem lies in the fact that the ids parameter received from the user input is directly passed to the deleteRecycleBin method without proper validation and sanitization. This can result in the successful execution of a malicious SQL query.

For details regarding the vulnerability, consult the following references

1. CVE-2022-45210 Official CVE Entry
 2. NVD - Vulnerability Details
 3. Jeecg-boot GitHub Repository


To mitigate the impact of this vulnerability and protect your application, follow the suggested actions:

1. Update Jeecg-boot: Ensure that your application is using the latest stable version of Jeecg-boot. Check the official GitHub repository for new releases and upgrade guides to help you minimize the risk of being affected by this vulnerability.

2. Input Validation: Properly validate and sanitize all user inputs, especially those that interact with the database. Use parameterized SQL queries or prepared statements instead of creating dynamic SQL queries based on unvalidated user input.

3. Least Privilege: Configure your application's database account to have the least privileges required for its operation. This will help minimize the potential damage caused by an attacker exploiting this vulnerability.

4. Monitoring: Implement proper application monitoring and logging. Regularly review logs to identify any suspicious activities and respond swiftly to potential security breaches.

In conclusion, the discovery of the CVE-2022-45210 vulnerability in Jeecg-boot v3.4.3 highlights the importance of continuously improving and updating your application security practices. By following the suggested mitigation strategies, you can help safeguard your application against this SQL injection exploit and protect sensitive data from falling into the hands of malicious actors.


Published on: 11/25/2022 17:15:00 UTC
Last modified on: 11/28/2022 19:41:00 UTC