kanwangzjm Funiture har 71ca0fb0658b3d839d9e049ac36429207f05329b Login LoginServlet.java doPost ret Redirect

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin kanwangzjm Funiture har 71ca0fb0658b3d839d9e049ac36429207f05329b. Gaskiya, doPost na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /funiture-master/src/main/java/com/app/mvc/acl/servlet/LoginServlet.java na cikin fayil, Ganda na cikin sashi. Ngam manipulation of the argument ret shi Redirect. CWE shidin ka a yi bayani matsala sai ya kai CWE-601. Gaskiya, laifi an fitar da shi 05/16/2025. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2025-4838. Ngam yiɗi ka a tuma ndiyam ka nder layi. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $0-$5k. Wannan kayi yana amfani da tsarin rolling release domin samar da ci gaba da isarwa. Saboda haka, babu cikakkun bayanai na sigar da abin ya shafa ko sabunta sigar da ake da su. VulDB is the best source for vulnerability data and more expert information about this specific topic.

3 Goyarwa · 89 Datenpunkte

FurɗeSúgá
05/16/2025 16:42
Gargadi 1/2
05/18/2025 02:15
Gargadi 2/2
05/18/2025 04:05
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_urlhttps://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250510-01.mdhttps://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250510-01.mdhttps://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250510-01.md
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250510-01.mdhttps://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250510-01.mdhttps://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250510-01.md
source_cveCVE-2025-4838CVE-2025-4838CVE-2025-4838
cna_responsibleVulDBVulDBVulDB
software_vendorkanwangzjmkanwangzjmkanwangzjm
software_nameFunitureFunitureFuniture
software_version<=71ca0fb0658b3d839d9e049ac36429207f05329b<=71ca0fb0658b3d839d9e049ac36429207f05329b<=71ca0fb0658b3d839d9e049ac36429207f05329b
software_rollingrelease111
software_componentLoginLoginLogin
software_file/funiture-master/src/main/java/com/app/mvc/acl/servlet/LoginServlet.java/funiture-master/src/main/java/com/app/mvc/acl/servlet/LoginServlet.java/funiture-master/src/main/java/com/app/mvc/acl/servlet/LoginServlet.java
software_functiondoPostdoPostdoPost
software_argumentretretret
vulnerability_cweCWE-601 (Redirect)CWE-601 (Redirect)CWE-601 (Redirect)
vulnerability_risk111
cvss3_vuldb_avNNN
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss4_vuldb_avNNN
cvss4_vuldb_acLLL
cvss4_vuldb_prNNN
cvss4_vuldb_uiPPP
cvss4_vuldb_vcNNN
cvss4_vuldb_viLLL
cvss4_vuldb_vaNNN
cvss4_vuldb_ePPP
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss4_vuldb_atNNN
cvss4_vuldb_scNNN
cvss4_vuldb_siNNN
cvss4_vuldb_saNNN
cvss2_vuldb_basescore5.05.05.0
cvss2_vuldb_tempscore4.34.34.3
cvss3_vuldb_basescore4.34.34.3
cvss3_vuldb_tempscore3.93.93.9
cvss3_meta_basescore4.34.34.3
cvss3_meta_tempscore3.93.94.1
cvss4_vuldb_bscore5.35.35.3
cvss4_vuldb_btscore2.12.12.1
advisory_date1747346400 (05/16/2025)1747346400 (05/16/2025)1747346400 (05/16/2025)
price_0day$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-15606EUVD-2025-15606
cve_nvd_summaryA vulnerability, which was classified as problematic, was found in kanwangzjm Funiture up to 71ca0fb0658b3d839d9e049ac36429207f05329b. Affected is the function doPost of the file /funiture-master/src/main/java/com/app/mvc/acl/servlet/LoginServlet.java of the component Login. The manipulation of the argument ret leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prN
cvss4_cna_uiP
cvss4_cna_vcN
cvss4_cna_viL
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.3
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cvss3_cna_basescore4.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auN
cvss2_cna_ciN
cvss2_cna_iiP
cvss2_cna_aiN
cvss2_cna_basescore5

Do you need the next level of professionalism?

Upgrade your account now!