ଜମା କରନ୍ତୁ #50577: 华夏ERP 越权访问漏洞ସୂଚନା

ଶୀର୍ଷକ华夏ERP 越权访问漏洞
ବର୍ଣ୍ଣନା华夏ERP默认集成了用户、权限、菜单、路由、分类、标签、日志、字段、表单、表格、上传、API等基本功能模块。华夏ERP是为了WEB应用敏捷开发和简化企业应用开发而诞生的、框架、模块、插件、模板均可独立升级和扩展。 华夏ERP后台在零售管理—零售出货中可通过访问绝对路径,获取系统信息。 可通过未登录的浏览器访问漏洞路径获取系统信息。 漏洞地址:http://ip:8080/index.html#/pages/bill/retail_out_list.html 代码下载地址:https://gitee.com/jishenghua/JSH_ERP
ଉତ୍ସ⚠️ https://github.com/Ha0Liu/cveAdd/blob/developer/README.EN.yuequan.md
ଉପଭୋକ୍ତା
 ha0l (UID 35011)
ଦାଖଲ11/02/2022 09:41 AM (3 ବର୍ଷ ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର11/02/2022 10:06 AM (25 minutes later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି212793 [Huaxia ERP Retail Management /depotHead/list ସନ୍ଧାନ କରନ୍ତୁ ସୂଚନା ପ୍ରକାଶ]
ପଏଣ୍ଟ20

Interested in the pricing of exploits?

See the underground prices here!