Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-25c3-4v7x-3hrp

Опубликовано: 03 фев. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 6.3

Описание

A vulnerability, which was classified as critical, was found in openBI up to 6.0.3. Affected is the function addxinzhi of the file application/controllers/User.php of the component Phar Handler. The manipulation of the argument outimgurl leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252696.

A vulnerability, which was classified as critical, was found in openBI up to 6.0.3. Affected is the function addxinzhi of the file application/controllers/User.php of the component Phar Handler. The manipulation of the argument outimgurl leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252696.

EPSS

Процентиль: 21%
0.00069
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 6.3
nvd
около 2 лет назад

A vulnerability, which was classified as critical, was found in openBI up to 6.0.3. Affected is the function addxinzhi of the file application/controllers/User.php of the component Phar Handler. The manipulation of the argument outimgurl leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252696.

EPSS

Процентиль: 21%
0.00069
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-502