CVE-2024-5354
anji-plus AJ-Report detailByCode information disclosure
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability classified as problematic was found in anji-plus AJ-Report up to 1.4.1. This vulnerability affects unknown code of the file /reportShare/detailByCode. The manipulation of the argument shareToken leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-266266 is the identifier assigned to this vulnerability.
Una vulnerabilidad fue encontrada en anji-plus AJ-Report hasta 1.4.1 y clasificada como problemática. Esta vulnerabilidad afecta a código desconocido del archivo /reportShare/detailByCode. La manipulación del argumento shareToken conduce a la divulgación de información. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-266266 es el identificador asignado a esta vulnerabilidad.
In anji-plus AJ-Report bis 1.4.1 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Das betrifft eine unbekannte Funktionalität der Datei /reportShare/detailByCode. Dank der Manipulation des Arguments shareToken mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-05-25 CVE Reserved
- 2024-05-26 CVE Published
- 2024-05-26 EPSS Updated
- 2024-08-01 CVE Updated
- 2024-08-01 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/anji-plus/report/issues/34 | Issue Tracking | |
https://vuldb.com/?id.266266 | Technical Description |
URL | Date | SRC |
---|---|---|
https://github.com/anji-plus/report/files/15363269/aj-report.pdf | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Anji-plus Search vendor "Anji-plus" | AJ-Report Search vendor "Anji-plus" for product "AJ-Report" | 1.4.0 Search vendor "Anji-plus" for product "AJ-Report" and version "1.4.0" | en |
Affected
| ||||||
Anji-plus Search vendor "Anji-plus" | AJ-Report Search vendor "Anji-plus" for product "AJ-Report" | 1.4.1 Search vendor "Anji-plus" for product "AJ-Report" and version "1.4.1" | en |
Affected
|