CVE-2022-46478

The RPC interface in datax-web v1.0.0 and v2.0.0 to v2.1.2 contains no permission checks by default which allows attackers to execute arbitrary commands via crafted Hessian serialized data.
References
Link Resource
https://github.com/WeiYe-Jing/datax-web/issues/587 Exploit Issue Tracking Third Party Advisory
https://github.com/WeiYe-Jing/datax-web/issues/587 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:datax-web_project:datax-web:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:30

Type Values Removed Values Added
Summary
  • (es) La interfaz RPC en datax-web v1.0.0 y v2.0.0 a v2.1.2 no contiene comprobaciones de permisos de forma predeterminada, lo que permite a los atacantes ejecutar comandos arbitrarios a través de datos serializados de Hesse manipulados.
References () https://github.com/WeiYe-Jing/datax-web/issues/587 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/WeiYe-Jing/datax-web/issues/587 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2023-01-13 01:15

Updated : 2024-11-21 07:30


NVD link : CVE-2022-46478

Mitre link : CVE-2022-46478

CVE.ORG link : CVE-2022-46478


JSON object : View

Products Affected

datax-web_project

  • datax-web
CWE
CWE-502

Deserialization of Untrusted Data