kanwangzjm Funiture har 71ca0fb0658b3d839d9e049ac36429207f05329b Login LoginServlet.java doPost ret Redirect
Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin kanwangzjm Funiture har 71ca0fb0658b3d839d9e049ac36429207f05329b. Gaskiya, doPost na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /funiture-master/src/main/java/com/app/mvc/acl/servlet/LoginServlet.java na cikin fayil, Ganda na cikin sashi. Ngam manipulation of the argument ret shi Redirect. CWE shidin ka a yi bayani matsala sai ya kai CWE-601. Gaskiya, laifi an fitar da shi 05/16/2025. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2025-4838. Ngam yiɗi ka a tuma ndiyam ka nder layi. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $0-$5k. Wannan kayi yana amfani da tsarin rolling release domin samar da ci gaba da isarwa. Saboda haka, babu cikakkun bayanai na sigar da abin ya shafa ko sabunta sigar da ake da su. VulDB is the best source for vulnerability data and more expert information about this specific topic.
3 Goyarwa · 89 Datenpunkte