Code Monkey home page Code Monkey logo

warehouse's Introduction

系统名称

仓库管理系统 warehouse

系统概要

仓库管理系统总共分为两个大的模块,分别是系统模块和业务模块。其中系统模块和业务模块底下又有其子模块。

功能模块

一、业务模块

1、客户管理
客户列表
客户分页和模糊查询
客户添加、修改、删除、批量删除
2、供应商管理
供应商列表
供应商分页和模糊查询
供应商添加、修改、删除、批量删除
3、商品管理
商品列表
商品分页和模糊查询
商品添加、修改、删除、商品图片的上传
4、商品进货管理
商品进货列表
商品进货分页和模糊查询
商品进货添加、修改、删除、商品退货
5、商品退货管理
商品退货列表
商品退货分页和模糊查询
商品退货删除
6、商品销售管理
商品销售列表
商品销售分页和模糊查询
商品销售添加、修改、删除、商品销售退货
7、商品销售退货管理
商品销售退货列表
商品销售退货分页和模糊查询
商品销售退货删除

二、系统模块

1、用户登陆
校验用户名、密码以及验证码
登陆成功将登陆信息写入登陆日志
未登录直接访问服务器资源进行拦截
2、菜单管理
全查询菜单和根据左边的树查询不同菜单
菜单的添加、修改、删除
3、角色管理
全查询角色和模糊查询
角色的添加、修改、删除以及给角色分配权限
4、用户管理
全查询用户和模糊查询
用户的添加、修改、删除、重置密码以及给用户分配角色
5、部门管理
全查询部门、模糊查询以及根据左边的树查询不同的部门
部门的添加、修改、删除

技术选型

后台技术选型

  • SpringBoot
  • Shiro
  • MybatisPlus

前端技术选型

  • LayUI、DTree

开发环境

  • 操作系统:Windows 10
  • 编程语言:Java
  • 开发工具:IDEA、Navicat、Git
  • 项目构建:Maven 3.5.2
  • 服务器:Tomcat 8.5
  • 数据库:MySQL 5.0
  • 代码托管平台:GitHub

预览效果

登陆页面 部门管理 菜单管理 权限管理 角色管理 用户管理 登陆日志管理 系统公告管理 缓存管理 客户管理 供应商管理 商品管理 商品进货管理 商品退货管理 商品销售管理 商品销售退货管理

讨论

有问题请在([issue])讨论 或联系我QQ:1784525940,你请注明来意。该项目是开源的,如果clone到本地运行不起来,或者需要我讲解之类的,我可以有偿讲解,伸手党勿加~

warehouse's People

Contributors

yeqifu avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

warehouse's Issues

密码错误

找不到用户储存的数据库的,一直显示密码错误

sql文件

能发送一个 sql文件吗 ,你文件里面的sql和mapper不能匹配,导致了登录出错,希望修正下,我的邮箱 1933315107@qq.com 谢谢

[vulnerability] Vertical Privilege Escalation Vulnerability in UserController.java

Vertical Privilege Escalation Vulnerability

1. Steps to reproduce

When logged in as a ordinary user, only the following menu bar is available.

image-20240130144219183

When logged in as a system user, the following menu bar is available.

image-20240130144110766

In other words, the reset password function is the privilege of the system user, ordinary users can not reset other people's passwords.

But when a ordinary user requests the route /user/resetPwd/{id}, it can reset the passwords of other users.

The PoC HTTP request message is as follows.

POST /user/resetPwd/1 HTTP/1.1
Host: 10.108.4.179:8888
User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Origin: http://10.108.4.179:8888
DNT: 1
Connection: close
Referer: http://10.108.4.179:8888/sys/toUserManager
Cookie: JSESSIONID=6CE3D4F751868479C2F7F0A9FE8C973B
Content-Length: 0


image-20240130144753460

You can see that the user with id 1 is the system administrator, but I reset the administrator's password using the ordinary user with id 4.

image-20240130144954270

2. Expected behavior

The com.yeqifu.sys.controller.UserController#resetPwd method was originally intended to be used to allow the system administrator to reset a user's password by passing in the user's id to reset the specified user's password.

image-20240130145334801

3. Actual behavior

However, this method does not check whether the currently logged in user has access to the endpoint, as long as the user is logged in can reset other people's passwords through this method.

This leads to a vulnerability where an ordinary user can reset other people's passwords just like an administrator.

4. Affected Version

This arbitrary file read vulnerability affect latest version: warehouse <= Apr 15, 2023

5. Fixes Recommendations

To fix this vulnerability, I have the following suggestions:

  1. verify that the current user has access rights to the endpoint before manipulating the data
  2. access to endpoints should be controlled by the backend, not through a menu bar on the frontend

密码错误

老哥你更新系统后新的管理员密码可以告知一下吗

sql文件

您好,请问该项目的sql文件是否能发一下,麻烦加您个微信

[vulnerability] Arbitrary File Read Vulnerability in AppFileUtils.java

Arbitrary File Read

1. Steps to reproduce

After logging in to the system with an account password and accessing the /file/showImageByPath , an arbitrary file read vulnerability exists in the path parameter.

The PoC HTTP request message is as follows.

GET /file/showImageByPath?path=../../tmp/poc/poc.txt HTTP/1.1
Host: 10.108.4.179:8888
User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: close
Referer: http://10.108.4.179:8888/sys/index
Cookie: JSESSIONID=08E5E5E33DC9F0EB1066298127666AC9
Upgrade-Insecure-Requests: 1


payload: path=../../any/file/want/to/read

As shown in the following figure, you can use the payload to read any file in the system.

image-20240130131636751

2. Expected behavior

com.yeqifu.sys.controller.FileController#showImageByPath method is meant to read the contents of the file pointed to by the path parameter and returns it to the client.

image-20240130133143673

The path variable is then passed directly to the com.yeqifu.sys.common.AppFileUtils#createResponseEntity method, which reads the contents of the file in the UPLOAD_PATH directory through the File object.

image-20240130132529140

3. Actual behavior

However, the path variable is spliced after the UPLOAD_PATH directory without any security filters in the passing process, resulting in a controllable file path that can be read by arbitrary files.

image-20240130133749473

4. Affected Version

This arbitrary file read vulnerability affect latest version: warehouse <= Apr 15, 2023

5. Fixes Recommendations

To fix this vulnerability, I have the following suggestions:

  1. add a security filter to the path passing process by removing ./, ../, etc.
  2. whenever possible, the value of the path variable should be controlled by the program, not the user.

请教

大佬有事请教,能不能加个联系方式(877819310)

首页的公告加载不出来

看你的演示首页公告可以加载出来,到本地就加载不出来,浏览器报这个错
Uncaught TypeError: Cannot read property 'title' of undefined
at Object.success (toDeskManager:110)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.