Open Redirect Vulnerability in JoeyBling Bootplus Affects Remote Functionality
CVE-2025-0705
Key Information:
- Vendor
- Joeybling
- Status
- Bootplus
- Vendor
- CVE Published:
- 24 January 2025
Badges
Summary
A critical vulnerability has been identified in the QR code functionality of JoeyBling's Bootplus. Specifically, the issue arises in the qrCode
function located in src/main/java/io/github/controller/QrCodeController.java
. An attacker can manipulate the text
argument to effectuate an open redirect, leading to potential phishing or malware attacks. This vulnerability can be exploited remotely, making it crucial for users of affected versions (up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d) to apply appropriate mitigation strategies. Continuous rolling releases from the vendor mean version-specific details for fixes may vary. As the exploit has been publicly disclosed, immediate attention is recommended.
Affected Version(s)
bootplus 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved