A vulnerability was found in Jinher OA 1.1. It has been rated as problematic. This issue affects some unknown processing of the file XmlHttp.aspx. The manipulation leads to xml external entity reference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
https://vuldb.com/?id.316925 | vdb entry third party advisory |
https://vuldb.com/?ctiid.316925 | vdb entry permissions required signature |
https://vuldb.com/?submit.616842 | vdb entry third party advisory |
https://github.com/cc2024k/CVE/issues/2 | third party advisory issue tracking exploit |