cvelist/2024/0xxx/CVE-2024-0491.json

109 lines
4.2 KiB
JSON
Raw Normal View History

2024-01-12 12:00:36 +00:00
{
2024-01-13 15:00:37 +00:00
"data_version": "4.0",
2024-01-12 12:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-0491",
2024-01-13 15:00:37 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2024-01-12 12:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-13 15:00:37 +00:00
"value": "A vulnerability classified as problematic has been found in Huaxia ERP up to 3.1. Affected is an unknown function of the file src/main/java/com/jsh/erp/controller/UserController.java. The manipulation leads to weak password recovery. It is possible to launch the attack remotely. Upgrading to version 3.2 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-250596."
},
{
"lang": "deu",
"value": "Es wurde eine problematische Schwachstelle in Huaxia ERP bis 3.1 entdeckt. Hiervon betroffen ist ein unbekannter Codeblock der Datei src/main/java/com/jsh/erp/controller/UserController.java. Mittels dem Manipulieren mit unbekannten Daten kann eine weak password recovery-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Ein Aktualisieren auf die Version 3.2 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-640 Weak Password Recovery",
"cweId": "CWE-640"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Huaxia",
"product": {
"product_data": [
{
"product_name": "ERP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.0"
},
{
"version_affected": "=",
"version_value": "3.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.250596",
"refsource": "MISC",
"name": "https://vuldb.com/?id.250596"
},
{
"url": "https://vuldb.com/?ctiid.250596",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.250596"
},
{
"url": "https://github.com/laoquanshi/puppy/blob/main/Logic%20loopholes%20in%20Huaxia%20ERP%20can%20lead%20to%20unauthorized%20access2.md",
"refsource": "MISC",
"name": "https://github.com/laoquanshi/puppy/blob/main/Logic%20loopholes%20in%20Huaxia%20ERP%20can%20lead%20to%20unauthorized%20access2.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "puppy (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
2024-01-12 12:00:36 +00:00
}
]
}
}