A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is the function checkFile of the file /api/deploy/upload. The manipulation of the argument servers leads to deserialization. The attack may be launched remotely.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://vuldb.com/?id.301502 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.301502 | signature vdb entry permissions required |
https://vuldb.com/?submit.522504 | third party advisory vdb entry |
https://github.com/elunez/eladmin/issues/873 | vendor advisory issue tracking exploit |