RuoYi v4.8.0 was discovered to allow unauthorized attackers to view the session ID of the admin in the system monitoring. This issue can allow attackers to impersonate Admin users via using a crafted cookie.
References
Link | Resource |
---|---|
https://github.com/peccc/restful_vul/blob/main/ruoyi_elevation_of_privileges/ruoyi_elevation_of_privileges.md | Exploit Third Party Advisory |
https://github.com/yangzongzhuan/RuoYi | Product |
https://ruoyi.vip/ | Product |
https://github.com/peccc/restful_vul/blob/main/ruoyi_elevation_of_privileges/ruoyi_elevation_of_privileges.md | Exploit Third Party Advisory |
Configurations
History
14 May 2025, 18:26
Type | Values Removed | Values Added |
---|---|---|
First Time |
Ruoyi
Ruoyi ruoyi |
|
CPE | cpe:2.3:a:ruoyi:ruoyi:4.8.0:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/peccc/restful_vul/blob/main/ruoyi_elevation_of_privileges/ruoyi_elevation_of_privileges.md - Exploit, Third Party Advisory | |
References | () https://github.com/yangzongzhuan/RuoYi - Product | |
References | () https://ruoyi.vip/ - Product |
29 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/peccc/restful_vul/blob/main/ruoyi_elevation_of_privileges/ruoyi_elevation_of_privileges.md - | |
CWE | CWE-922 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
29 Jan 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-29 15:15
Updated : 2025-05-14 18:26
NVD link : CVE-2024-57436
Mitre link : CVE-2024-57436
CVE.ORG link : CVE-2024-57436
JSON object : View
Products Affected
ruoyi
- ruoyi
CWE
CWE-922
Insecure Storage of Sensitive Information