A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet allows unauthenticated remote attackers to execute arbitrary Java code via the bsh.script parameter. This can be exploited to run system commands and ultimately gain full control over the target server. The issue is rooted in a third-party JAR component bundled with the application, and the servlet is accessible without authentication on vulnerable installations.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Jun 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet allows unauthenticated remote attackers to execute arbitrary Java code via the bsh.script parameter. This can be exploited to run system commands and ultimately gain full control over the target server. The issue is rooted in a third-party JAR component bundled with the application, and the servlet is accessible without authentication on vulnerable installations. | |
Title | Yonyou NC BeanShell Command Injection | |
Weaknesses | CWE-306 CWE-78 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-06-24T01:07:05.619Z
Updated: 2025-06-24T15:46:50.749Z
Reserved: 2025-04-15T19:15:22.546Z
Link: CVE-2025-34039

Updated: 2025-06-24T15:46:46.016Z

Status : Awaiting Analysis
Published: 2025-06-24T02:15:22.540
Modified: 2025-06-26T18:58:14.280
Link: CVE-2025-34039

No data.