A vulnerability was found in Antabot White-Jotter 0.22. It has been declared as critical. This vulnerability affects the function CookieRememberMeManager of the file ShiroConfiguration.java of the component com.gm.wj.config.ShiroConfiguration. The manipulation with the input EVANNIGHTLY_WAOU leads to deserialization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://vuldb.com/?id.319138 | technical description vdb entry third party advisory |
https://vuldb.com/?ctiid.319138 | signature vdb entry permissions required |
https://vuldb.com/?submit.621105 | vdb entry third party advisory |
https://github.com/Antabot/White-Jotter/issues/161 | exploit issue tracking |
https://github.com/Antabot/White-Jotter/issues/161#issue-3254420874 | exploit issue tracking |