cve/2024/CVE-2024-5351.md

19 lines
991 B
Markdown
Raw Normal View History

2024-06-08 09:32:58 +00:00
### [CVE-2024-5351](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5351)
![](https://img.shields.io/static/v1?label=Product&message=AJ-Report&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.4.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization&color=brighgreen)
### Description
A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been declared as critical. Affected by this vulnerability is the function getValueFromJs of the component Javascript Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266263.
### POC
#### Reference
- https://github.com/anji-plus/report/files/15363269/aj-report.pdf
2024-06-09 00:33:16 +00:00
- https://github.com/anji-plus/report/files/15363269/aj-report.pdf
2024-06-08 09:32:58 +00:00
#### Github
No PoCs found on GitHub currently.