A vulnerability was found in dayrui XunRuiCMS up to 4.6.4. It has been declared as critical. This vulnerability affects unknown code of the file /Control/Api/Api.php. The manipulation of the argument thumb leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://vuldb.com/?id.295090 | technical description vdb entry third party advisory |
https://vuldb.com/?ctiid.295090 | vdb entry permissions required signature |
https://vuldb.com/?submit.495820 | third party advisory vdb entry |
https://github.com/pwysec/d6qRhl/blob/main/1.pdf | broken link exploit |