Lucene search

K
cveVulDBCVE-2024-5353
HistoryMay 26, 2024 - 4:15 a.m.

CVE-2024-5353

2024-05-2604:15:08
CWE-22
VulDB
web.nvd.nist.gov
29
vulnerability
anji-plus aj-report
critical
zip file handler
path traversal
remote attack
disclosure
vdb-266265
nvd
cve-2024-5353

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CVSS4

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

15.5%

A vulnerability classified as critical has been found in anji-plus AJ-Report up to 1.4.1. This affects the function decompress of the component ZIP File Handler. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266265 was assigned to this vulnerability.

Affected configurations

Vulners
Node
anji-plusaj-reportMatch1.4.0
OR
anji-plusaj-reportMatch1.4.1
VendorProductVersionCPE
anji-plusaj-report1.4.0cpe:2.3:a:anji-plus:aj-report:1.4.0:*:*:*:*:*:*:*
anji-plusaj-report1.4.1cpe:2.3:a:anji-plus:aj-report:1.4.1:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "anji-plus",
    "product": "AJ-Report",
    "versions": [
      {
        "version": "1.4.0",
        "status": "affected"
      },
      {
        "version": "1.4.1",
        "status": "affected"
      }
    ],
    "modules": [
      "ZIP File Handler"
    ]
  }
]

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CVSS4

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

15.5%

Related for CVE-2024-5353