CVE-2024-5352
anji-plus AJ-Report validationRules deserialization
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266264.
Se encontró una vulnerabilidad en anji-plus AJ-Report hasta 1.4.1. Ha sido calificada como crítica. La función validationRules del componente com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification es afectada por esta vulnerabilidad. La manipulación conduce a la deserialización. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-266264.
Eine kritische Schwachstelle wurde in anji-plus AJ-Report bis 1.4.1 ausgemacht. Hierbei geht es um die Funktion validationRules der Komponente com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. Durch das Beeinflussen mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-05-25 CVE Reserved
- 2024-05-26 CVE Published
- 2024-05-26 EPSS Updated
- 2024-08-01 CVE Updated
- 2024-08-01 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/anji-plus/report/issues/34 | Issue Tracking | |
https://vuldb.com/?id.266264 | Technical Description |
URL | Date | SRC |
---|---|---|
https://github.com/anji-plus/report/files/15363269/aj-report.pdf | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Anji-plus Search vendor "Anji-plus" | AJ-Report Search vendor "Anji-plus" for product "AJ-Report" | 1.4.0 Search vendor "Anji-plus" for product "AJ-Report" and version "1.4.0" | en |
Affected
| ||||||
Anji-plus Search vendor "Anji-plus" | AJ-Report Search vendor "Anji-plus" for product "AJ-Report" | 1.4.1 Search vendor "Anji-plus" for product "AJ-Report" and version "1.4.1" | en |
Affected
|