Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4q63-jfmh-r5cw

Опубликовано: 03 мая 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

LG Simple Editor getServerSetting Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the getServerSetting method. The issue results from the exposure of plaintext credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20012.

LG Simple Editor getServerSetting Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the getServerSetting method. The issue results from the exposure of plaintext credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20012.

EPSS

Процентиль: 40%
0.00178
Низкий

7.5 High

CVSS3

Дефекты

CWE-200
CWE-522

Связанные уязвимости

CVSS3: 7.5
nvd
почти 2 года назад

LG Simple Editor getServerSetting Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getServerSetting method. The issue results from the exposure of plaintext credentials. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-20012.

EPSS

Процентиль: 40%
0.00178
Низкий

7.5 High

CVSS3

Дефекты

CWE-200
CWE-522