A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266264.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://vuldb.com/?id.266264 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.266264 | signature vdb entry permissions required |
https://github.com/anji-plus/report/issues/34 | issue tracking broken link |
https://github.com/anji-plus/report/files/15363269/aj-report.pdf | exploit |