cve/2024/CVE-2024-5350.md
2024-06-18 02:51:15 +02:00

18 lines
905 B
Markdown

### [CVE-2024-5350](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5350)
![](https://img.shields.io/static/v1?label=Product&message=AJ-Report&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.4.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been classified as critical. Affected is the function pageList of the file /pageList. The manipulation of the argument p leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266262 is the identifier assigned to this vulnerability.
### POC
#### Reference
- https://github.com/anji-plus/report/files/15363269/aj-report.pdf
#### Github
No PoCs found on GitHub currently.