CVE-2024-5351

A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been declared as critical. Affected by this vulnerability is the function getValueFromJs of the component Javascript Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266263.
Configurations

Configuration 1 (hide)

cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*

History

01 Mar 2025, 02:33

Type Values Removed Values Added
References () https://github.com/anji-plus/report/files/15363269/aj-report.pdf - () https://github.com/anji-plus/report/files/15363269/aj-report.pdf - Exploit
References () https://github.com/anji-plus/report/issues/34 - () https://github.com/anji-plus/report/issues/34 - Broken Link
References () https://vuldb.com/?ctiid.266263 - () https://vuldb.com/?ctiid.266263 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.266263 - () https://vuldb.com/?id.266263 - VDB Entry, Third Party Advisory
CPE cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*
First Time Anji-plus aj-report
Anji-plus

Information

Published : 2024-05-26 00:15

Updated : 2025-03-01 02:33


NVD link : CVE-2024-5351

Mitre link : CVE-2024-5351

CVE.ORG link : CVE-2024-5351


JSON object : View

Products Affected

anji-plus

  • aj-report
CWE
CWE-502

Deserialization of Untrusted Data