CVE-2024-5352

A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266264.
Configurations

Configuration 1 (hide)

cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*

History

01 Mar 2025, 02:33

Type Values Removed Values Added
CPE cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*
First Time Anji-plus aj-report
Anji-plus
References () https://github.com/anji-plus/report/files/15363269/aj-report.pdf - () https://github.com/anji-plus/report/files/15363269/aj-report.pdf - Exploit
References () https://github.com/anji-plus/report/issues/34 - () https://github.com/anji-plus/report/issues/34 - Broken Link
References () https://vuldb.com/?ctiid.266264 - () https://vuldb.com/?ctiid.266264 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.266264 - () https://vuldb.com/?id.266264 - Third Party Advisory, VDB Entry

21 Nov 2024, 09:47

Type Values Removed Values Added
References () https://github.com/anji-plus/report/files/15363269/aj-report.pdf - () https://github.com/anji-plus/report/files/15363269/aj-report.pdf -
References () https://github.com/anji-plus/report/issues/34 - () https://github.com/anji-plus/report/issues/34 -
References () https://vuldb.com/?ctiid.266264 - () https://vuldb.com/?ctiid.266264 -
References () https://vuldb.com/?id.266264 - () https://vuldb.com/?id.266264 -

28 May 2024, 12:39

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en anji-plus AJ-Report hasta 1.4.1. Ha sido calificada como crítica. La función validationRules del componente com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification es afectada por esta vulnerabilidad. La manipulación conduce a la deserialización. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-266264.

26 May 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-26 01:15

Updated : 2025-03-01 02:33


NVD link : CVE-2024-5352

Mitre link : CVE-2024-5352

CVE.ORG link : CVE-2024-5352


JSON object : View

Products Affected

anji-plus

  • aj-report
CWE
CWE-502

Deserialization of Untrusted Data