anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server.
The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state.
Link | Tags |
---|---|
https://vulncheck.com/advisories/aj-report-swagger | third party advisory |
https://gitee.com/anji-plus/report/pulls/166/files | patch |
https://xz.aliyun.com/t/14460 | third party advisory exploit technical description |
https://github.com/yuebusao/AJ-REPORT-EXPLOIT | exploit |
https://github.com/vulhub/vulhub/tree/master/aj-report/CNVD-2024-15077 | third party advisory exploit |