A vulnerability was found in dayrui XunRuiCMS 4.6.3. It has been classified as critical. Affected is the function import_add of the file dayrui/Fcms/Control/Admin/Linkage.php. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://vuldb.com/?id.295080 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.295080 | signature permissions required |
https://vuldb.com/?submit.495366 | third party advisory |
https://github.com/stevenchen0x01/CVE2/blob/main/cve2.md | third party advisory exploit broken link |