THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-1198

openBI Phar User.php addxinzhi deserialization

AssignerVulDB
Reserved2024-02-02
Published2024-02-02
Updated2024-07-05

Description

EN DE

A vulnerability, which was classified as critical, was found in openBI up to 6.0.3. Affected is the function addxinzhi of the file application/controllers/User.php of the component Phar Handler. The manipulation of the argument outimgurl leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252696.

Es wurde eine Schwachstelle in openBI bis 6.0.3 gefunden. Sie wurde als kritisch eingestuft. Hiervon betroffen ist die Funktion addxinzhi der Datei application/controllers/User.php der Komponente Phar Handler. Durch Manipulation des Arguments outimgurl mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.



MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.5CVSS:2.0/AV:N/AC:L/Au:S/C:P/I:P/A:P

Problem types

CWE-502 Deserialization

Timeline

2024-02-02:Advisory disclosed
2024-02-02:VulDB entry created
2024-02-02:VulDB entry last update

Credits

glzjin (VulDB User) reporter

References

https://vuldb.com/?id.252696 vdb-entry technical-description

https://vuldb.com/?ctiid.252696 signature permissions-required

https://note.zhaoj.in/share/qFXZZfp1NLa3 broken-link exploit

cve.org CVE-2024-1198

nvd.nist.gov CVE-2024-1198

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-1198
© Copyright 2024 THREATINT. Made in Cyprus with +