-
Notifications
You must be signed in to change notification settings - Fork 206
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- 1 new CVEs: CVE-2024-13111 - 0 updated CVEs:
- Loading branch information
cvelistV5 Github Action
committed
Jan 2, 2025
1 parent
3a869eb
commit 66854fe
Showing
3 changed files
with
177 additions
and
53 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,154 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-13111", | ||
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "VulDB", | ||
"dateReserved": "2025-01-01T11:31:35.238Z", | ||
"datePublished": "2025-01-02T14:00:15.703Z", | ||
"dateUpdated": "2025-01-02T14:00:15.703Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", | ||
"shortName": "VulDB", | ||
"dateUpdated": "2025-01-02T14:00:15.703Z" | ||
}, | ||
"title": "Beijing Yunfan Internet Technology Yunfan Learning Examination System JWT Token SysUserControl improper authentication", | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"type": "CWE", | ||
"cweId": "CWE-287", | ||
"lang": "en", | ||
"description": "Improper Authentication" | ||
} | ||
] | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "Beijing Yunfan Internet Technology", | ||
"product": "Yunfan Learning Examination System", | ||
"versions": [ | ||
{ | ||
"version": "1.9.2", | ||
"status": "affected" | ||
} | ||
], | ||
"modules": [ | ||
"JWT Token Handler" | ||
] | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "A vulnerability classified as critical was found in Beijing Yunfan Internet Technology Yunfan Learning Examination System 1.9.2. Affected by this vulnerability is an unknown functionality of the file src/main/java/com/yf/exam/modules/sys/user/controller/SysUserControl of the component JWT Token Handler. The manipulation leads to improper authentication. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used." | ||
}, | ||
{ | ||
"lang": "de", | ||
"value": "In Beijing Yunfan Internet Technology Yunfan Learning Examination System 1.9.2 wurde eine kritische Schwachstelle entdeckt. Betroffen ist eine unbekannte Verarbeitung der Datei src/main/java/com/yf/exam/modules/sys/user/controller/SysUserControl der Komponente JWT Token Handler. Dank der Manipulation mit unbekannten Daten kann eine improper authentication-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung." | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV4_0": { | ||
"version": "4.0", | ||
"baseScore": 6.3, | ||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", | ||
"baseSeverity": "MEDIUM" | ||
} | ||
}, | ||
{ | ||
"cvssV3_1": { | ||
"version": "3.1", | ||
"baseScore": 5.6, | ||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", | ||
"baseSeverity": "MEDIUM" | ||
} | ||
}, | ||
{ | ||
"cvssV3_0": { | ||
"version": "3.0", | ||
"baseScore": 5.6, | ||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", | ||
"baseSeverity": "MEDIUM" | ||
} | ||
}, | ||
{ | ||
"cvssV2_0": { | ||
"version": "2.0", | ||
"baseScore": 5.1, | ||
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P" | ||
} | ||
} | ||
], | ||
"timeline": [ | ||
{ | ||
"time": "2025-01-01T00:00:00.000Z", | ||
"lang": "en", | ||
"value": "Advisory disclosed" | ||
}, | ||
{ | ||
"time": "2025-01-01T01:00:00.000Z", | ||
"lang": "en", | ||
"value": "VulDB entry created" | ||
}, | ||
{ | ||
"time": "2025-01-01T12:36:44.000Z", | ||
"lang": "en", | ||
"value": "VulDB entry last update" | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"value": "LVZC (VulDB User)", | ||
"type": "reporter" | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://vuldb.com/?id.289927", | ||
"name": "VDB-289927 | Beijing Yunfan Internet Technology Yunfan Learning Examination System JWT Token SysUserControl improper authentication", | ||
"tags": [ | ||
"vdb-entry" | ||
] | ||
}, | ||
{ | ||
"url": "https://vuldb.com/?ctiid.289927", | ||
"name": "VDB-289927 | CTI Indicators (IOB, IOC, IOA)", | ||
"tags": [ | ||
"signature", | ||
"permissions-required" | ||
] | ||
}, | ||
{ | ||
"url": "https://vuldb.com/?submit.467701", | ||
"name": "Submit #467701 | Beijing Yunfan Internet Technology Co., Ltd yfexam-exam 1.9.2 JWT defects", | ||
"tags": [ | ||
"third-party-advisory" | ||
] | ||
}, | ||
{ | ||
"url": "https://github.com/qiutiandefeng/yfexam-exam/issues/6", | ||
"tags": [ | ||
"issue-tracking" | ||
] | ||
}, | ||
{ | ||
"url": "https://github.com/qiutiandefeng/yfexam-exam/issues/6#issue-2754680012", | ||
"tags": [ | ||
"exploit", | ||
"issue-tracking" | ||
] | ||
} | ||
] | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,44 +1,14 @@ | ||
{ | ||
"fetchTime": "2025-01-02T13:52:01.333Z", | ||
"numberOfChanges": 6, | ||
"new": [], | ||
"updated": [ | ||
{ | ||
"cveId": "CVE-2024-49926", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49926", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49926.json", | ||
"dateUpdated": "2025-01-02T13:48:46.130Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-50121", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50121", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50121.json", | ||
"dateUpdated": "2025-01-02T13:48:47.732Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-50146", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50146", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50146.json", | ||
"dateUpdated": "2025-01-02T13:48:49.307Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-53099", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53099", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53099.json", | ||
"dateUpdated": "2025-01-02T13:48:50.826Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-53128", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53128", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53128.json", | ||
"dateUpdated": "2025-01-02T13:48:52.439Z" | ||
}, | ||
{ | ||
"cveId": "CVE-2024-56710", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56710", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56710.json", | ||
"dateUpdated": "2025-01-02T13:48:53.968Z" | ||
"fetchTime": "2025-01-02T14:05:51.786Z", | ||
"numberOfChanges": 1, | ||
"new": [ | ||
{ | ||
"cveId": "CVE-2024-13111", | ||
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13111", | ||
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13111.json", | ||
"dateUpdated": "2025-01-02T14:00:15.703Z" | ||
} | ||
], | ||
"updated": [], | ||
"error": [] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters