mymagicpower AIAS 20250308 LocalStorageController.java Datoteke Eskalacija privilegija

Pronađena je ranjivost klasifikovana kao Kritične u mymagicpower AIAS 20250308. Zahvaćeno je nepoznata funkcija u fajlu training_platform/train-platform/src/main/java/top/aias/training/controller/LocalStorageController.java. Izmena argumenta Datoteke rezultira Eskalacija privilegija. Korišćenje CWE za deklarisanje problema vodi do CWE-434. Ova slabost je objavljena 04/07/2025. Obaveštenje je dostupno za preuzimanje na github.com. Ova ranjivost je označena kao CVE-2025-3410. Moguće je pokrenuti napad na daljinu. Napad mora biti izveden unutar lokalne mreže. Tehnički detalji su dostupni. Поред тога, експлоит је доступан. Eksploatacija je otkrivena javnosti i može biti iskorišćena. Trenutno je cena za eksploataciju približno USD $0-$5k u ovom momentu. MITRE ATT&CK projekat deklariše tehniku napada kao T1608.002. Označeno je kao dokaz-of-koncept. Eksploat je dostupan za preuzimanje na github.com. Kao 0-day, procenjena cena na crnom tržištu bila je oko $0-$5k. Once again VulDB remains the best source for vulnerability data.

2 Promene · 97 Tačke podataka

PoljeKreirali
04/07/2025 13:09
Ažurira 1/1
09/04/2025 18:00
software_vendormymagicpowermymagicpower
software_nameAIASAIAS
software_version2025030820250308
software_filetraining_platform/train-platform/src/main/java/top/aias/training/controller/LocalStorageController.javatraining_platform/train-platform/src/main/java/top/aias/training/controller/LocalStorageController.java
software_argumentfilefile
vulnerability_cweCWE-434 (Eskalacija privilegija)CWE-434 (Eskalacija privilegija)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_RCE.mdhttps://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_RCE.md
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_RCE.mdhttps://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_RCE.md
source_cveCVE-2025-3410CVE-2025-3410
cna_responsibleVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore6.56.5
cvss2_vuldb_tempscore5.65.6
cvss3_vuldb_basescore6.36.3
cvss3_vuldb_tempscore5.75.7
cvss3_meta_basescore6.37.1
cvss3_meta_tempscore5.76.9
cvss4_vuldb_bscore5.35.3
cvss4_vuldb_btscore2.12.1
advisory_date1743976800 (04/07/2025)1743976800 (04/07/2025)
price_0day$0-$5k$0-$5k
cve_nvd_summaryA vulnerability classified as critical was found in mymagicpower AIAS 20250308. This vulnerability affects unknown code of the file training_platform/train-platform/src/main/java/top/aias/training/controller/LocalStorageController.java. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cve_nvd_summaryesSe encontró una vulnerabilidad clasificada como crítica en mymagicpower AIAS 20250308. Esta vulnerabilidad afecta al código desconocido del archivo training_platform/train-platform/src/main/java/top/aias/training/controller/LocalStorageController.java. La manipulación del argumento "File" permite la carga sin restricciones. El ataque puede iniciarse remotamente. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viL
cvss4_cna_vaL
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.3
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cvss3_cna_basescore6.3
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore8.8
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore6.5

Do you need the next level of professionalism?

Upgrade your account now!