cve/2024/CVE-2024-13110.md
2025-09-29 21:09:30 +02:00

20 lines
1.6 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-13110](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13110)
![](https://img.shields.io/static/v1?label=Product&message=Yunfan%20Learning%20Examination%20System&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.9.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Access%20Controls&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brightgreen)
### Description
A vulnerability classified as problematic has been found in Beijing Yunfan Internet Technology Yunfan Learning Examination System 1.9.2. Affected is an unknown function of the file src/main/java/com/yf/exam/modules/paper/controller/PaperController.java of the component Exam Answer Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Es wurde eine problematische Schwachstelle in Beijing Yunfan Internet Technology Yunfan Learning Examination System 1.9.2 entdeckt. Hiervon betroffen ist ein unbekannter Codeblock der Datei src/main/java/com/yf/exam/modules/paper/controller/PaperController.java der Komponente Exam Answer Handler. Durch Beeinflussen mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds