CVE-2024-5352

A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266264.
Configurations

No configuration.

History

28 May 2024, 12:39

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en anji-plus AJ-Report hasta 1.4.1. Ha sido calificada como crítica. La función validationRules del componente com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification es afectada por esta vulnerabilidad. La manipulación conduce a la deserialización. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-266264.

26 May 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-26 01:15

Updated : 2024-06-21 18:15


NVD link : CVE-2024-5352

Mitre link : CVE-2024-5352

CVE.ORG link : CVE-2024-5352


JSON object : View

Products Affected

No product.

CWE
CWE-502

Deserialization of Untrusted Data