Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fqqp-7v7w-5xhp

Опубликовано: 29 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.5
CVSS3: 7.3

Описание

A vulnerability was identified in Bjskzy Zhiyou ERP up to 11.0. Affected by this vulnerability is the function openForm of the component com.artery.richclient.RichClientService. Such manipulation of the argument contentString leads to xml external entity reference. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was identified in Bjskzy Zhiyou ERP up to 11.0. Affected by this vulnerability is the function openForm of the component com.artery.richclient.RichClientService. Such manipulation of the argument contentString leads to xml external entity reference. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 21%
0.00069
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-610
CWE-611

Связанные уязвимости

CVSS3: 7.3
nvd
4 месяца назад

A vulnerability was identified in Bjskzy Zhiyou ERP up to 11.0. Affected by this vulnerability is the function openForm of the component com.artery.richclient.RichClientService. Such manipulation of the argument contentString leads to xml external entity reference. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 21%
0.00069
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-610
CWE-611