y_project RuoYi har 4.7.9 Backend User Import SysUserServiceImpl.java SysUserServiceImpl loginName Cross Site Scripting
Gaskiya vulnerability da aka ware a matsayin karshewa an samu a y_project RuoYi har 4.7.9. Hakika, aikin SysUserServiceImpl ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java, a cikin sashen Backend User Import. A sa manipulation of the argument loginName ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 09/20/2024 kamar IAR6Q3. An raba bayanin tsaro don saukewa a gitee.com. Wannan matsala ana saninta da CVE-2024-9048. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga gitee.com. 0-day shima, an ndiyam a wuro be $0-$5k. Ana kiran patch ɗin da 9b68013b2af87b9c809c4637299abd929bc73510. An tanadi gyaran matsalar don saukewa a gitee.com. Ana shawartar a saka patch domin warware wannan matsala. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
5 Goyarwa · 99 Datenpunkte