Vulnerability Description
A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266264.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Anji-Plus | Aj-Report | <= 1.4.1 |
Related Weaknesses (CWE)
References
- https://github.com/anji-plus/report/files/15363269/aj-report.pdfExploit
- https://github.com/anji-plus/report/issues/34Broken Link
- https://vuldb.com/?ctiid.266264Permissions RequiredVDB Entry
- https://vuldb.com/?id.266264Third Party AdvisoryVDB Entry
- https://github.com/anji-plus/report/files/15363269/aj-report.pdfExploit
- https://github.com/anji-plus/report/issues/34Broken Link
- https://vuldb.com/?ctiid.266264Permissions RequiredVDB Entry
- https://vuldb.com/?id.266264Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-5352?
CVE-2024-5352 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business...
How severe is CVE-2024-5352?
CVE-2024-5352 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-5352?
Check the references section above for vendor advisories and patch information. Affected products include: Anji-Plus Aj-Report.