2024-01-19 13:00:35 +00:00
{
2024-01-19 22:00:35 +00:00
"data_version" : "4.0" ,
2024-01-19 13:00:35 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2024-0739" ,
2024-01-19 22:00:35 +00:00
"ASSIGNER" : "cna@vuldb.com" ,
"STATE" : "PUBLIC"
2024-01-19 13:00:35 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-01-19 22:00:35 +00:00
"value" : "A vulnerability, which was classified as critical, was found in Hecheng Leadshop up to 1.4.20. Affected is an unknown function of the file /web/leadshop.php. The manipulation of the argument install leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-251562 is the identifier assigned to this vulnerability."
} ,
{
"lang" : "deu" ,
"value" : "Es wurde eine Schwachstelle in Hecheng Leadshop bis 1.4.20 gefunden. Sie wurde als kritisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei /web/leadshop.php. Durch die Manipulation des Arguments install mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-502 Deserialization" ,
"cweId" : "CWE-502"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Hecheng" ,
"product" : {
"product_data" : [
{
"product_name" : "Leadshop" ,
"version" : {
"version_data" : [
{
"version_affected" : "=" ,
"version_value" : "1.4.0"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.1"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.2"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.3"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.4"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.5"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.6"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.7"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.8"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.9"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.10"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.11"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.12"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.13"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.14"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.15"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.16"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.17"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.18"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.19"
} ,
{
"version_affected" : "=" ,
"version_value" : "1.4.20"
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://vuldb.com/?id.251562" ,
"refsource" : "MISC" ,
"name" : "https://vuldb.com/?id.251562"
} ,
{
"url" : "https://vuldb.com/?ctiid.251562" ,
"refsource" : "MISC" ,
"name" : "https://vuldb.com/?ctiid.251562"
} ,
{
"url" : "https://note.zhaoj.in/share/vLswXhWxUrs8" ,
"refsource" : "MISC" ,
"name" : "https://note.zhaoj.in/share/vLswXhWxUrs8"
}
]
} ,
"credits" : [
{
"lang" : "en" ,
"value" : "glzjin (VulDB User)"
}
] ,
"impact" : {
"cvss" : [
{
"version" : "3.1" ,
"baseScore" : 7.3 ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" ,
"baseSeverity" : "HIGH"
} ,
{
"version" : "3.0" ,
"baseScore" : 7.3 ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" ,
"baseSeverity" : "HIGH"
} ,
{
"version" : "2.0" ,
"baseScore" : 7.5 ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P"
2024-01-19 13:00:35 +00:00
}
]
}
}