cvelist/2025/2xxx/CVE-2025-2705.json
2025-03-24 17:00:32 +00:00

124 lines
4.4 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2025-2705",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as critical has been found in Digiwin ERP 5.1. Affected is the function DoUpload/DoWebUpload of the file /Api/FileUploadApi.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Es wurde eine kritische Schwachstelle in Digiwin ERP 5.1 entdeckt. Hiervon betroffen ist die Funktion DoUpload/DoWebUpload der Datei /Api/FileUploadApi.ashx. Durch Manipulieren des Arguments File mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Unrestricted Upload",
"cweId": "CWE-434"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Improper Access Controls",
"cweId": "CWE-284"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Digiwin",
"product": {
"product_data": [
{
"product_name": "ERP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.300726",
"refsource": "MISC",
"name": "https://vuldb.com/?id.300726"
},
{
"url": "https://vuldb.com/?ctiid.300726",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.300726"
},
{
"url": "https://vuldb.com/?submit.516291",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.516291"
},
{
"url": "https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_3.md",
"refsource": "MISC",
"name": "https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_3.md"
},
{
"url": "https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_4.md",
"refsource": "MISC",
"name": "https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_4.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "XU NIE (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 7.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "HIGH"
},
{
"version": "3.0",
"baseScore": 7.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "HIGH"
},
{
"version": "2.0",
"baseScore": 7.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
}
]
}
}