Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xm33-6wj2-8hph

Опубликовано: 05 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.5
CVSS3: 5.3

Описание

A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is some unknown functionality of the file eladmin-system\src\main\resources\config\application-prod.yml of the component Druid. The manipulation of the argument login-username/login-password leads to use of default credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is some unknown functionality of the file eladmin-system\src\main\resources\config\application-prod.yml of the component Druid. The manipulation of the argument login-username/login-password leads to use of default credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 14%
0.00045
Низкий

5.5 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-1392
CWE-798

Связанные уязвимости

CVSS3: 5.3
nvd
6 месяцев назад

A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is some unknown functionality of the file eladmin-system\src\main\resources\config\application-prod.yml of the component Druid. The manipulation of the argument login-username/login-password leads to use of default credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 14%
0.00045
Низкий

5.5 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-1392
CWE-798