Lanling OA Landray Office Automation (OA) internal patch number #133383/#137780 contains an arbitrary file read vulnerability via the component /sys/ui/extend/varkind/custom.jsp.
References
Link | Resource |
---|---|
https://codeantenna.com/a/DXQfemaZEH | Exploit Third Party Advisory |
https://developpaper.com/lanling-oa-foreground-arbitrary-file-reading-vulnerability-exploitation/ | Exploit Third Party Advisory |
https://codeantenna.com/a/DXQfemaZEH | Exploit Third Party Advisory |
https://developpaper.com/lanling-oa-foreground-arbitrary-file-reading-vulnerability-exploitation/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://codeantenna.com/a/DXQfemaZEH - Exploit, Third Party Advisory | |
References | () https://developpaper.com/lanling-oa-foreground-arbitrary-file-reading-vulnerability-exploitation/ - Exploit, Third Party Advisory |
Information
Published : 2022-08-02 20:15
Updated : 2024-11-21 07:10
NVD link : CVE-2022-34924
Mitre link : CVE-2022-34924
CVE.ORG link : CVE-2022-34924
JSON object : View
Products Affected
landray
- landray_office_automation
CWE
CWE-312
Cleartext Storage of Sensitive Information