![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-7314 – anji-plus AJ-Report Authentication Bypass
https://notcve.org/view.php?id=CVE-2024-7314
02 Aug 2024 — anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. • https://gitee.com/anji-plus/report/pulls/166/files • CWE-280: Improper Handling of Insufficient Permissions or Privileges •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-5356 – anji-plus AJ-Report testTransform;swagger-ui sql injection
https://notcve.org/view.php?id=CVE-2024-5356
26 May 2024 — A vulnerability, which was classified as critical, was found in anji-plus AJ-Report up to 1.4.1. Affected is an unknown function of the file /dataSet/testTransform;swagger-ui. The manipulation of the argument dynSentence leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/droyuu/Aj-Report-sql-CVE-2024-5356-POC • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-5355 – anji-plus AJ-Report IGroovyHandler command injection
https://notcve.org/view.php?id=CVE-2024-5355
26 May 2024 — A vulnerability, which was classified as critical, has been found in anji-plus AJ-Report up to 1.4.1. This issue affects the function IGroovyHandler. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-5354 – anji-plus AJ-Report detailByCode information disclosure
https://notcve.org/view.php?id=CVE-2024-5354
26 May 2024 — A vulnerability classified as problematic was found in anji-plus AJ-Report up to 1.4.1. This vulnerability affects unknown code of the file /reportShare/detailByCode. The manipulation of the argument shareToken leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-5353 – anji-plus AJ-Report ZIP File decompress path traversal
https://notcve.org/view.php?id=CVE-2024-5353
26 May 2024 — A vulnerability classified as critical has been found in anji-plus AJ-Report up to 1.4.1. This affects the function decompress of the component ZIP File Handler. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-5352 – anji-plus AJ-Report validationRules deserialization
https://notcve.org/view.php?id=CVE-2024-5352
26 May 2024 — A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf • CWE-502: Deserialization of Untrusted Data •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-5351 – anji-plus AJ-Report Javascript getValueFromJs deserialization
https://notcve.org/view.php?id=CVE-2024-5351
26 May 2024 — A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been declared as critical. Affected by this vulnerability is the function getValueFromJs of the component Javascript Handler. The manipulation leads to deserialization. The attack can be launched remotely. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf • CWE-502: Deserialization of Untrusted Data •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-5350 – anji-plus AJ-Report pageList sql injection
https://notcve.org/view.php?id=CVE-2024-5350
25 May 2024 — A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been classified as critical. Affected is the function pageList of the file /pageList. The manipulation of the argument p leads to sql injection. It is possible to launch the attack remotely. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-46973
https://notcve.org/view.php?id=CVE-2022-46973
03 Mar 2023 — Report v0.9.8.6 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability. • https://github.com/Fw-fW-fw/UPDATE-CVE/blob/main/CVE-2022-46973 • CWE-918: Server-Side Request Forgery (SSRF) •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-42983
https://notcve.org/view.php?id=CVE-2022-42983
17 Oct 2022 — anji-plus AJ-Report 0.9.8.6 allows remote attackers to bypass login authentication by spoofing JWT Tokens. anji-plus AJ-Report versión 0.9.8.6, permite a atacantes remotos omitir la autenticación de inicio de sesión mediante la suplantación de tokens JWT • https://gitee.com/anji-plus/report/issues/I5VVZ0 • CWE-290: Authentication Bypass by Spoofing •