anji-plus AJ-Report 0.9.8.6 allows remote attackers to bypass login authentication by spoofing JWT Tokens.
References
Link | Resource |
---|---|
https://gitee.com/anji-plus/report/issues/I5VVZ0 | Exploit Third Party Advisory |
https://github.com/anji-plus/report/issues/7 | Exploit Third Party Advisory |
https://gitee.com/anji-plus/report/issues/I5VVZ0 | Exploit Third Party Advisory |
https://github.com/anji-plus/report/issues/7 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitee.com/anji-plus/report/issues/I5VVZ0 - Exploit, Third Party Advisory | |
References | () https://github.com/anji-plus/report/issues/7 - Exploit, Third Party Advisory |
08 Aug 2024, 12:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Anji-plus aj-report
|
|
CPE | cpe:2.3:a:anji-plus:aj-report:0.9.8.6:*:*:*:*:*:*:* |
Information
Published : 2022-10-17 07:15
Updated : 2024-11-21 07:25
NVD link : CVE-2022-42983
Mitre link : CVE-2022-42983
CVE.ORG link : CVE-2022-42983
JSON object : View
Products Affected
anji-plus
- aj-report
CWE
CWE-290
Authentication Bypass by Spoofing