cve/2024/CVE-2024-5355.md

19 lines
952 B
Markdown
Raw Normal View History

2024-06-08 09:32:58 +00:00
### [CVE-2024-5355](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5355)
![](https://img.shields.io/static/v1?label=Product&message=AJ-Report&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.4.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Command%20Injection&color=brighgreen)
### Description
A vulnerability, which was classified as critical, has been found in anji-plus AJ-Report up to 1.4.1. This issue affects the function IGroovyHandler. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266267.
### POC
#### Reference
- https://github.com/anji-plus/report/files/15363269/aj-report.pdf
2024-06-09 00:33:16 +00:00
- https://github.com/anji-plus/report/files/15363269/aj-report.pdf
2024-06-08 09:32:58 +00:00
#### Github
No PoCs found on GitHub currently.