Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w36w-37xx-85wg

Опубликовано: 30 сент. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 3.7

Описание

A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927.

A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927.

EPSS

Процентиль: 21%
0.0007
Низкий

3.7 Low

CVSS3

Дефекты

CWE-530
CWE-552

Связанные уязвимости

CVSS3: 3.7
nvd
больше 2 лет назад

A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927.

EPSS

Процентиль: 21%
0.0007
Низкий

3.7 Low

CVSS3

Дефекты

CWE-530
CWE-552