CVE-2024-5352 – anji-plus AJ-Report validationRules deserialization
https://notcve.org/view.php?id=CVE-2024-5352
A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf https://github.com/anji-plus/report/issues/34 https://vuldb.com/?ctiid.266264 https://vuldb.com/?id.266264 • CWE-502: Deserialization of Untrusted Data •
CVE-2024-5351 – anji-plus AJ-Report Javascript getValueFromJs deserialization
https://notcve.org/view.php?id=CVE-2024-5351
A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been declared as critical. Affected by this vulnerability is the function getValueFromJs of the component Javascript Handler. The manipulation leads to deserialization. The attack can be launched remotely. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf https://github.com/anji-plus/report/issues/34 https://vuldb.com/?ctiid.266263 https://vuldb.com/?id.266263 • CWE-502: Deserialization of Untrusted Data •
CVE-2024-5350 – anji-plus AJ-Report pageList sql injection
https://notcve.org/view.php?id=CVE-2024-5350
A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been classified as critical. Affected is the function pageList of the file /pageList. The manipulation of the argument p leads to sql injection. It is possible to launch the attack remotely. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf https://github.com/anji-plus/report/issues/34 https://vuldb.com/?ctiid.266262 https://vuldb.com/?id.266262 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •