ageerle ruoyi-ai Dok 2.0.1 API Interface SysModelController.java Eskalacija privilegija

Identifikovana je ranjivost klasifikovana kao Kritične u ageerle ruoyi-ai Dok 2.0.1. Obuhvaćeno je nepoznata funkcija u fajlu ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java u komponenti API Interface. Promena uzrokuje Eskalacija privilegija. Korišćenje CWE za deklarisanje problema vodi do CWE-285. Objava slabosti je izvršena 04/03/2025 kao 43. Obaveštenje je dostupno za preuzimanje na github.com. Ova ranjivost je označena kao CVE-2025-3199. Moguće je pokrenuti napad na daljinu. Napad mora biti izveden unutar lokalne mreže. Tehnički detalji su dostupni. Штавише, експлоит је доступан. Eksploatacija je otkrivena javnosti i može biti iskorišćena. U ovom trenutku, trenutna cena za eksploataciju može iznositi oko USD $0-$5k. MITRE ATT&CK projekat deklariše tehniku napada kao T1548.002. Označeno je kao dokaz-of-koncept. Eksploat je dostupan za preuzimanje na github.com. Kao 0-day, procenjena cena na crnom tržištu bila je oko $0-$5k. Ako nadogradite na verziju 2.0.2, ovaj problem može biti rešen. Ažurirana verzija je spremna za preuzimanje na github.com. Zakrpa se zove c0daf641fb25b244591b7a6c3affa35c69d321fe. Popravka je spremna za preuzimanje na github.com. Preporučuje se nadogradnja pogođene komponente. If you want to get best quality of vulnerability data, you may have to visit VulDB.

4 Promene · 105 Tačke podataka

PoljeKreirali
04/03/2025 13:25
Ažurira 1/3
04/04/2025 12:11
Ažurira 2/3
04/04/2025 14:13
Ažurira 3/3
08/26/2025 04:04
cvss3_vuldb_sUUUU
cvss3_vuldb_cLLLL
cvss3_vuldb_iLLLL
cvss3_vuldb_aLLLL
cvss3_vuldb_ePPPP
cvss3_vuldb_rlOOOO
cvss3_vuldb_rcCCCC
advisory_identifier43434343
advisory_urlhttps://github.com/Tr0e/CVE_Hunter/blob/main/ruoyi-ai/ruoyi-ai_UnauthorizedAccess_01.mdhttps://github.com/Tr0e/CVE_Hunter/blob/main/ruoyi-ai/ruoyi-ai_UnauthorizedAccess_01.mdhttps://github.com/Tr0e/CVE_Hunter/blob/main/ruoyi-ai/ruoyi-ai_UnauthorizedAccess_01.mdhttps://github.com/Tr0e/CVE_Hunter/blob/main/ruoyi-ai/ruoyi-ai_UnauthorizedAccess_01.md
advisory_confirm_urlhttps://github.com/ageerle/ruoyi-ai/issues/43#issuecomment-2763091490https://github.com/ageerle/ruoyi-ai/issues/43#issuecomment-2763091490https://github.com/ageerle/ruoyi-ai/issues/43#issuecomment-2763091490https://github.com/ageerle/ruoyi-ai/issues/43#issuecomment-2763091490
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/ageerle/ruoyi-ai/issues/43https://github.com/ageerle/ruoyi-ai/issues/43https://github.com/ageerle/ruoyi-ai/issues/43https://github.com/ageerle/ruoyi-ai/issues/43
countermeasure_nameNadogradnjuNadogradnjuNadogradnjuNadogradnju
upgrade_version2.0.22.0.22.0.22.0.2
countermeasure_upgrade_urlhttps://github.com/ageerle/ruoyi-ai/releases/tag/v2.0.2https://github.com/ageerle/ruoyi-ai/releases/tag/v2.0.2https://github.com/ageerle/ruoyi-ai/releases/tag/v2.0.2https://github.com/ageerle/ruoyi-ai/releases/tag/v2.0.2
patch_namec0daf641fb25b244591b7a6c3affa35c69d321fec0daf641fb25b244591b7a6c3affa35c69d321fec0daf641fb25b244591b7a6c3affa35c69d321fec0daf641fb25b244591b7a6c3affa35c69d321fe
countermeasure_patch_urlhttps://github.com/gwozai/ruoyi-ai/commit/c0daf641fb25b244591b7a6c3affa35c69d321fehttps://github.com/gwozai/ruoyi-ai/commit/c0daf641fb25b244591b7a6c3affa35c69d321fehttps://github.com/gwozai/ruoyi-ai/commit/c0daf641fb25b244591b7a6c3affa35c69d321fehttps://github.com/gwozai/ruoyi-ai/commit/c0daf641fb25b244591b7a6c3affa35c69d321fe
source_cveCVE-2025-3199CVE-2025-3199CVE-2025-3199CVE-2025-3199
cna_responsibleVulDBVulDBVulDBVulDB
software_vendorageerleageerleageerleageerle
software_nameruoyi-airuoyi-airuoyi-airuoyi-ai
software_version<=2.0.1<=2.0.1<=2.0.1<=2.0.1
software_componentAPI InterfaceAPI InterfaceAPI InterfaceAPI Interface
software_fileruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.javaruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.javaruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.javaruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java
vulnerability_cweCWE-285 (Eskalacija privilegija)CWE-285 (Eskalacija privilegija)CWE-285 (Eskalacija privilegija)CWE-285 (Eskalacija privilegija)
vulnerability_risk2222
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_prNNNN
cvss3_vuldb_uiNNNN
software_typeArtificial Intelligence SoftwareArtificial Intelligence SoftwareArtificial Intelligence SoftwareArtificial Intelligence Software
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_auNNNN
cvss2_vuldb_ciPPPP
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiPPPP
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcCCCC
cvss2_vuldb_rlOFOFOFOF
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_prNNNN
cvss4_vuldb_uiNNNN
cvss4_vuldb_vcLLLL
cvss4_vuldb_viLLLL
cvss4_vuldb_vaLLLL
cvss4_vuldb_ePPPP
cvss4_vuldb_atNNNN
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss2_vuldb_basescore7.57.57.57.5
cvss2_vuldb_tempscore5.95.95.95.9
cvss3_vuldb_basescore7.37.37.37.3
cvss3_vuldb_tempscore6.66.66.66.6
cvss3_meta_basescore7.37.37.38.1
cvss3_meta_tempscore6.66.96.97.9
cvss4_vuldb_bscore6.96.96.96.9
cvss4_vuldb_btscore5.55.55.55.5
advisory_date1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was found in ageerle ruoyi-ai up to 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java of the component API Interface. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.2 is able to address this issue. The name of the patch is c0daf641fb25b244591b7a6c3affa35c69d321fe. It is recommended to upgrade the affected component.A vulnerability was found in ageerle ruoyi-ai up to 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java of the component API Interface. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.2 is able to address this issue. The name of the patch is c0daf641fb25b244591b7a6c3affa35c69d321fe. It is recommended to upgrade the affected component.A vulnerability was found in ageerle ruoyi-ai up to 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java of the component API Interface. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.2 is able to address this issue. The name of the patch is c0daf641fb25b244591b7a6c3affa35c69d321fe. It is recommended to upgrade the affected component.
cvss4_cna_avNNN
cvss4_cna_acLLL
cvss4_cna_atNNN
cvss4_cna_prNNN
cvss4_cna_uiNNN
cvss4_cna_vcLLL
cvss4_cna_viLLL
cvss4_cna_vaLLL
cvss4_cna_scNNN
cvss4_cna_siNNN
cvss4_cna_saNNN
cvss4_cna_bscore6.96.96.9
cvss3_cna_avNNN
cvss3_cna_acLLL
cvss3_cna_prNNN
cvss3_cna_uiNNN
cvss3_cna_sUUU
cvss3_cna_cLLL
cvss3_cna_iLLL
cvss3_cna_aLLL
cvss3_cna_basescore7.37.37.3
cvss2_cna_avNNN
cvss2_cna_acLLL
cvss2_cna_auNNN
cvss2_cna_ciPPP
cvss2_cna_iiPPP
cvss2_cna_aiPPP
cvss2_cna_basescore7.57.57.5
cve_nvd_summaryesSe encontró una vulnerabilidad en ageerle ruoyi-ai hasta la versión 2.0.1, clasificada como crítica. Este problema afecta a una funcionalidad desconocida del archivo ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java de la interfaz API del componente. La manipulación da lugar a una autorización indebida. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado. Actualizar a la versión 2.0.2 puede solucionar este problema. El parche se llama c0daf641fb25b244591b7a6c3affa35c69d321fe. Se recomienda actualizar el componente afectado.Se encontró una vulnerabilidad en ageerle ruoyi-ai hasta la versión 2.0.1, clasificada como crítica. Este problema afecta a una funcionalidad desconocida del archivo ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java de la interfaz API del componente. La manipulación da lugar a una autorización indebida. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado. Actualizar a la versión 2.0.2 puede solucionar este problema. El parche se llama c0daf641fb25b244591b7a6c3affa35c69d321fe. Se recomienda actualizar el componente afectado.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore9.8

Might our Artificial Intelligence support you?

Check our Alexa App!