A vulnerability was found in ChestnutCMS up to 15.1. It has been declared as critical. This vulnerability affects unknown code of the file /dev-api/groovy/exec of the component API Endpoint. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://vuldb.com/?id.311002 | vdb entry |
https://vuldb.com/?ctiid.311002 | signature permissions required |
https://vuldb.com/?submit.587199 | third party advisory |
https://github.com/byxs0x0/cve/issues/7 | exploit issue tracking |