Products
anji-plus AJ-Report
Source
disclosure@vulncheck.com
Tags
CVE-2024-7314 details
Published : Aug. 2, 2024, 5:16 p.m.
Last Modified : Aug. 2, 2024, 5:16 p.m.
Last Modified : Aug. 2, 2024, 5:16 p.m.
Description
anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9.8 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-280 | Improper Handling of Insufficient Permissions or Privileges | The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
9.8
Exploitability Score
3.9
Impact Score
5.9
Base Severity
CRITICAL
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://gitee.com/anji-plus/report/pulls/166/files | disclosure@vulncheck.com |
https://github.com/vulhub/vulhub/tree/master/aj-report/CNVD-2024-15077 | disclosure@vulncheck.com |
https://github.com/yuebusao/AJ-REPORT-EXPLOIT | disclosure@vulncheck.com |
https://vulncheck.com/advisories/aj-report-swagger | disclosure@vulncheck.com |
https://xz.aliyun.com/t/14460 | disclosure@vulncheck.com |
This website uses the NVD API, but is not approved or certified by it.