Open Redirect Vulnerability in JoeyBling Bootplus Affects Remote Functionality
CVE-2025-0705

6.9MEDIUM

Key Information:

Vendor
Joeybling
Status
Bootplus
Vendor
CVE Published:
24 January 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A critical vulnerability has been identified in the QR code functionality of JoeyBling's Bootplus. Specifically, the issue arises in the qrCode function located in src/main/java/io/github/controller/QrCodeController.java. An attacker can manipulate the text argument to effectuate an open redirect, leading to potential phishing or malware attacks. This vulnerability can be exploited remotely, making it crucial for users of affected versions (up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d) to apply appropriate mitigation strategies. Continuous rolling releases from the vendor mean version-specific details for fixes may vary. As the exploit has been publicly disclosed, immediate attention is recommended.

Affected Version(s)

bootplus 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

LVZC3 (VulDB User)
.