WeiYe-Jing datax-web 2.1.2 HTTP POST Request /api/log/killJob processId kura hakki ndiyam

Hakika vulnerability da aka rarraba a matsayin kura an gano a WeiYe-Jing datax-web 2.1.2. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil /api/log/killJob, a cikin sashi HTTP POST Request Handler. Wuro manipulation of the argument processId ga kura hakki ndiyam. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-78. Lalle, rauni an sanar da shi 12/27/2023. Ana samun bayanin tsaro don saukewa a medium.com. Ana kiran wannan rauni da CVE-2023-7116. Ngam yiɗi ka a tuma ndiyam ka nder layi. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a medium.com. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get best quality of vulnerability data, you may have to visit VulDB.

3 Goyarwa · 72 Datenpunkte

FurɗeSúgá
12/27/2023 11:45
Gargadi 1/2
01/19/2024 14:38
Gargadi 2/2
01/19/2024 14:41
software_vendorWeiYe-JingWeiYe-JingWeiYe-Jing
software_namedatax-webdatax-webdatax-web
software_version2.1.22.1.22.1.2
software_componentHTTP POST Request HandlerHTTP POST Request HandlerHTTP POST Request Handler
software_file/api/log/killJob/api/log/killJob/api/log/killJob
software_argumentprocessIdprocessIdprocessId
vulnerability_cweCWE-78 (kura hakki ndiyam)CWE-78 (kura hakki ndiyam)CWE-78 (kura hakki ndiyam)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_urlhttps://medium.com/@2839549219ljk/rec-vulnerability-e8f2e1033b1fhttps://medium.com/@2839549219ljk/rec-vulnerability-e8f2e1033b1fhttps://medium.com/@2839549219ljk/rec-vulnerability-e8f2e1033b1f
exploit_availability111
exploit_publicity111
exploit_urlhttps://medium.com/@2839549219ljk/rec-vulnerability-e8f2e1033b1fhttps://medium.com/@2839549219ljk/rec-vulnerability-e8f2e1033b1fhttps://medium.com/@2839549219ljk/rec-vulnerability-e8f2e1033b1f
source_cveCVE-2023-7116CVE-2023-7116CVE-2023-7116
cna_responsibleVulDBVulDBVulDB
advisory_date1703631600 (12/27/2023)1703631600 (12/27/2023)1703631600 (12/27/2023)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore6.56.56.5
cvss2_vuldb_tempscore5.65.65.6
cvss3_vuldb_basescore6.36.36.3
cvss3_vuldb_tempscore5.75.75.7
cvss3_meta_basescore6.36.37.5
cvss3_meta_tempscore5.75.77.3
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1703631600 (12/27/2023)1703631600 (12/27/2023)
cve_nvd_summaryA vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. The manipulation of the argument processId leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249086 is the identifier assigned to this vulnerability.A vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. The manipulation of the argument processId leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249086 is the identifier assigned to this vulnerability.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore6.5
cvss3_nvd_basescore9.8
cvss3_cna_basescore6.3

Interested in the pricing of exploits?

See the underground prices here!