y_project RuoYi har 4.7.9 Backend User Import SysUserServiceImpl.java SysUserServiceImpl loginName Cross Site Scripting

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a y_project RuoYi har 4.7.9. Hakika, aikin SysUserServiceImpl ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java, a cikin sashen Backend User Import. A sa manipulation of the argument loginName ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 09/20/2024 kamar IAR6Q3. An raba bayanin tsaro don saukewa a gitee.com. Wannan matsala ana saninta da CVE-2024-9048. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga gitee.com. 0-day shima, an ndiyam a wuro be $0-$5k. Ana kiran patch ɗin da 9b68013b2af87b9c809c4637299abd929bc73510. An tanadi gyaran matsalar don saukewa a gitee.com. Ana shawartar a saka patch domin warware wannan matsala. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

5 Goyarwa · 99 Datenpunkte

FurɗeSúgá
09/20/2024 17:40
Gargadi 1/4
09/21/2024 17:05
Gargadi 2/4
09/27/2024 05:58
Gargadi 3/4
09/30/2024 15:32
Gargadi 4/4
03/09/2025 18:26
software_vendory_projecty_projecty_projecty_projecty_project
software_nameRuoYiRuoYiRuoYiRuoYiRuoYi
software_version<=4.7.9<=4.7.9<=4.7.9<=4.7.9<=4.7.9
software_componentBackend User ImportBackend User ImportBackend User ImportBackend User ImportBackend User Import
software_fileruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.javaruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.javaruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.javaruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.javaruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java
software_functionSysUserServiceImplSysUserServiceImplSysUserServiceImplSysUserServiceImplSysUserServiceImpl
software_argumentloginNameloginNameloginNameloginNameloginName
vulnerability_cweCWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acHHHHH
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiRRRRR
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aNNNNN
cvss3_vuldb_ePPPPP
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_identifierIAR6Q3IAR6Q3IAR6Q3IAR6Q3IAR6Q3
advisory_urlhttps://gitee.com/y_project/RuoYi/issues/IAR6Q3https://gitee.com/y_project/RuoYi/issues/IAR6Q3https://gitee.com/y_project/RuoYi/issues/IAR6Q3https://gitee.com/y_project/RuoYi/issues/IAR6Q3https://gitee.com/y_project/RuoYi/issues/IAR6Q3
advisory_confirm_urlhttps://gitee.com/y_project/RuoYi/issues/IAR6Q3#note_31993641_linkhttps://gitee.com/y_project/RuoYi/issues/IAR6Q3#note_31993641_linkhttps://gitee.com/y_project/RuoYi/issues/IAR6Q3#note_31993641_linkhttps://gitee.com/y_project/RuoYi/issues/IAR6Q3#note_31993641_linkhttps://gitee.com/y_project/RuoYi/issues/IAR6Q3#note_31993641_link
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://gitee.com/y_project/RuoYi/issues/IAR6Q3https://gitee.com/y_project/RuoYi/issues/IAR6Q3https://gitee.com/y_project/RuoYi/issues/IAR6Q3https://gitee.com/y_project/RuoYi/issues/IAR6Q3https://gitee.com/y_project/RuoYi/issues/IAR6Q3
countermeasure_nameKariKariKariKariKari
patch_name9b68013b2af87b9c809c4637299abd929bc735109b68013b2af87b9c809c4637299abd929bc735109b68013b2af87b9c809c4637299abd929bc735109b68013b2af87b9c809c4637299abd929bc735109b68013b2af87b9c809c4637299abd929bc73510
countermeasure_patch_urlhttps://gitee.com/y_project/RuoYi/commit/9b68013b2af87b9c809c4637299abd929bc73510https://gitee.com/y_project/RuoYi/commit/9b68013b2af87b9c809c4637299abd929bc73510https://gitee.com/y_project/RuoYi/commit/9b68013b2af87b9c809c4637299abd929bc73510https://gitee.com/y_project/RuoYi/commit/9b68013b2af87b9c809c4637299abd929bc73510https://gitee.com/y_project/RuoYi/commit/9b68013b2af87b9c809c4637299abd929bc73510
source_cveCVE-2024-9048CVE-2024-9048CVE-2024-9048CVE-2024-9048CVE-2024-9048
cna_responsibleVulDBVulDBVulDBVulDBVulDB
software_typeProject Management SoftwareProject Management SoftwareProject Management SoftwareProject Management SoftwareProject Management Software
cvss2_vuldb_avNNNNN
cvss2_vuldb_acHHHHH
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiNNNNN
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss4_vuldb_avNNNNN
cvss4_vuldb_acHHHHH
cvss4_vuldb_prNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaNNNNN
cvss4_vuldb_ePPPPP
cvss4_vuldb_atNNNNN
cvss4_vuldb_uiNNNNP
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore2.62.62.62.62.6
cvss2_vuldb_tempscore2.02.02.02.02.0
cvss3_vuldb_basescore3.13.13.13.13.1
cvss3_vuldb_tempscore2.82.82.82.82.8
cvss3_meta_basescore3.13.13.14.14.1
cvss3_meta_tempscore2.82.92.94.04.0
cvss4_vuldb_bscore6.36.36.36.32.3
cvss4_vuldb_btscore2.92.92.92.91.3
advisory_date1726783200 (09/20/2024)1726783200 (09/20/2024)1726783200 (09/20/2024)1726783200 (09/20/2024)1726783200 (09/20/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was found in y_project RuoYi up to 4.7.9. It has been declared as problematic. Affected by this vulnerability is the function SysUserServiceImpl of the file ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java of the component Backend User Import. The manipulation of the argument loginName leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The patch is named 9b68013b2af87b9c809c4637299abd929bc73510. It is recommended to apply a patch to fix this issue.A vulnerability was found in y_project RuoYi up to 4.7.9. It has been declared as problematic. Affected by this vulnerability is the function SysUserServiceImpl of the file ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java of the component Backend User Import. The manipulation of the argument loginName leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The patch is named 9b68013b2af87b9c809c4637299abd929bc73510. It is recommended to apply a patch to fix this issue.A vulnerability was found in y_project RuoYi up to 4.7.9. It has been declared as problematic. Affected by this vulnerability is the function SysUserServiceImpl of the file ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java of the component Backend User Import. The manipulation of the argument loginName leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The patch is named 9b68013b2af87b9c809c4637299abd929bc73510. It is recommended to apply a patch to fix this issue.A vulnerability was found in y_project RuoYi up to 4.7.9. It has been declared as problematic. Affected by this vulnerability is the function SysUserServiceImpl of the file ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java of the component Backend User Import. The manipulation of the argument loginName leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The patch is named 9b68013b2af87b9c809c4637299abd929bc73510. It is recommended to apply a patch to fix this issue.
cvss3_cna_avNNNN
cvss3_cna_acHHHH
cvss3_cna_prNNNN
cvss3_cna_uiRRRR
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iLLLL
cvss3_cna_aNNNN
cvss3_cna_basescore3.13.13.13.1
cvss2_cna_avNNNN
cvss2_cna_acHHHH
cvss2_cna_auNNNN
cvss2_cna_ciNNNN
cvss2_cna_iiPPPP
cvss2_cna_aiNNNN
cvss2_cna_basescore2.62.62.62.6
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en y_project RuoYi hasta la versión 4.7.9. Se ha declarado como problemática. La vulnerabilidad afecta a la función SysUserServiceImpl del archivo ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java del componente Backend User Import. La manipulación del argumento loginName provoca cross site scripting. El ataque se puede lanzar de forma remota. La complejidad de un ataque es bastante alta. La explotación parece ser difícil. El exploit se ha hecho público y puede utilizarse. El parche se llama 9b68013b2af87b9c809c4637299abd929bc73510. Se recomienda aplicar un parche para solucionar este problema.Se ha encontrado una vulnerabilidad en y_project RuoYi hasta la versión 4.7.9. Se ha declarado como problemática. La vulnerabilidad afecta a la función SysUserServiceImpl del archivo ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java del componente Backend User Import. La manipulación del argumento loginName provoca cross site scripting. El ataque se puede lanzar de forma remota. La complejidad de un ataque es bastante alta. La explotación parece ser difícil. El exploit se ha hecho público y puede utilizarse. El parche se llama 9b68013b2af87b9c809c4637299abd929bc73510. Se recomienda aplicar un parche para solucionar este problema.Se ha encontrado una vulnerabilidad en y_project RuoYi hasta la versión 4.7.9. Se ha declarado como problemática. La vulnerabilidad afecta a la función SysUserServiceImpl del archivo ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java del componente Backend User Import. La manipulación del argumento loginName provoca cross site scripting. El ataque se puede lanzar de forma remota. La complejidad de un ataque es bastante alta. La explotación parece ser difícil. El exploit se ha hecho público y puede utilizarse. El parche se llama 9b68013b2af87b9c809c4637299abd929bc73510. Se recomienda aplicar un parche para solucionar este problema.
cvss3_nvd_avNN
cvss3_nvd_acLL
cvss3_nvd_prNN
cvss3_nvd_uiRR
cvss3_nvd_sCC
cvss3_nvd_cLL
cvss3_nvd_iLL
cvss3_nvd_aNN
cvss3_nvd_basescore6.16.1

Do you want to use VulDB in your project?

Use the official API to access entries easily!