|
|||
Rule General Information |
---|
Release Date: | 2024-09-24 | |
Rule Name: | Aj-Report SQL Injection Vulnerability (CVE-2024-5356) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | A vulnerability, which was classified as critical, was found in anji-plus AJ-Report up to 1.4.1. Affected is an unknown function of the file /dataSet/testTransform;swagger-ui. The manipulation of the argument dynSentence leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266268. | |
Impact: | An attacker can inject arbitrary sql commands to view or change the database of the target by exploiting the vulnerability successfully. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://github.com/anji-plus/report/files/15363269/aj-report.pdf https://github.com/anji-plus/report/issues/34 https://vuldb.com/?ctiid.266268 https://vuldb.com/?id.266268 |
|
Solutions |
---|
Please contact the software vendor to update the software patch. |