We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-1198

openBI Phar User.php addxinzhi deserialization



Description

EN DE

A vulnerability, which was classified as critical, was found in openBI up to 6.0.3. Affected is the function addxinzhi of the file application/controllers/User.php of the component Phar Handler. The manipulation of the argument outimgurl leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252696.

Es wurde eine Schwachstelle in openBI bis 6.0.3 gefunden. Sie wurde als kritisch eingestuft. Hiervon betroffen ist die Funktion addxinzhi der Datei application/controllers/User.php der Komponente Phar Handler. Durch Manipulation des Arguments outimgurl mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

Reserved 2024-02-02 | Published 2024-02-02 | Updated 2024-08-01 | Assigner VulDB


MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P

Problem types

CWE-502 Deserialization

Timeline

2024-02-02:Advisory disclosed
2024-02-02:VulDB entry created
2024-02-02:VulDB entry last update

Credits

glzjin (VulDB User) reporter

References

vuldb.com/?id.252696 vdb-entry technical-description

vuldb.com/?ctiid.252696 signature permissions-required

note.zhaoj.in/share/qFXZZfp1NLa3 broken-link exploit

cve.org (CVE-2024-1198)

nvd.nist.gov (CVE-2024-1198)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-1198

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.