cvelist/2024/5xxx/CVE-2024-5355.json

108 lines
4.0 KiB
JSON
Raw Normal View History

2024-05-25 06:00:35 +00:00
{
2024-05-26 06:00:34 +00:00
"data_version": "4.0",
2024-05-25 06:00:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-5355",
2024-05-26 06:00:34 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2024-05-25 06:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-05-26 06:00:34 +00:00
"value": "A vulnerability, which was classified as critical, has been found in anji-plus AJ-Report up to 1.4.1. This issue affects the function IGroovyHandler. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266267."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in anji-plus AJ-Report bis 1.4.1 entdeckt. Sie wurde als kritisch eingestuft. Dies betrifft die Funktion IGroovyHandler. Dank Manipulation mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Command Injection",
"cweId": "CWE-77"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "anji-plus",
"product": {
"product_data": [
{
"product_name": "AJ-Report",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.4.0"
},
{
"version_affected": "=",
"version_value": "1.4.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.266267",
"refsource": "MISC",
"name": "https://vuldb.com/?id.266267"
},
{
"url": "https://vuldb.com/?ctiid.266267",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.266267"
},
{
"url": "https://github.com/anji-plus/report/issues/34",
"refsource": "MISC",
"name": "https://github.com/anji-plus/report/issues/34"
},
{
"url": "https://github.com/anji-plus/report/files/15363269/aj-report.pdf",
"refsource": "MISC",
"name": "https://github.com/anji-plus/report/files/15363269/aj-report.pdf"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
2024-05-25 06:00:35 +00:00
}
]
}
}