CVE-2024-5356
anji-plus AJ-Report testTransform;swagger-ui sql injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
A vulnerability, which was classified as critical, was found in anji-plus AJ-Report up to 1.4.1. Affected is an unknown function of the file /dataSet/testTransform;swagger-ui. The manipulation of the argument dynSentence leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266268.
Una vulnerabilidad fue encontrada en anji-plus AJ-Report hasta 1.4.1 y clasificada como crítica. Una función desconocida del archivo /dataSet/testTransform;swagger-ui es afectada por esta vulnerabilidad. La manipulación del argumento dynSentence conduce a la inyección de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-266268.
Es wurde eine Schwachstelle in anji-plus AJ-Report bis 1.4.1 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /dataSet/testTransform;swagger-ui. Mit der Manipulation des Arguments dynSentence mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-05-25 CVE Reserved
- 2024-05-26 CVE Published
- 2024-05-26 EPSS Updated
- 2024-08-01 CVE Updated
- 2024-08-01 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/anji-plus/report/issues/34 | Issue Tracking | |
https://vuldb.com/?id.266268 | Technical Description | |
https://vuldb.com/?submit.338486 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/droyuu/Aj-Report-sql-CVE-2024-5356-POC | 2024-09-12 | |
https://github.com/anji-plus/report/files/15363269/aj-report.pdf | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Anji-plus Search vendor "Anji-plus" | AJ-Report Search vendor "Anji-plus" for product "AJ-Report" | 1.4.0 Search vendor "Anji-plus" for product "AJ-Report" and version "1.4.0" | en |
Affected
| ||||||
Anji-plus Search vendor "Anji-plus" | AJ-Report Search vendor "Anji-plus" for product "AJ-Report" | 1.4.1 Search vendor "Anji-plus" for product "AJ-Report" and version "1.4.1" | en |
Affected
|