cve/2024/CVE-2024-5352.md
2024-06-09 00:33:16 +00:00

19 lines
1.0 KiB
Markdown

### [CVE-2024-5352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5352)
![](https://img.shields.io/static/v1?label=Product&message=AJ-Report&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.4.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization&color=brighgreen)
### Description
A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266264.
### POC
#### Reference
- https://github.com/anji-plus/report/files/15363269/aj-report.pdf
- https://github.com/anji-plus/report/files/15363269/aj-report.pdf
#### Github
No PoCs found on GitHub currently.