All the vulnerabilites related to zzskzy - Warehouse Refinement Management System
cve-2025-2216
Vulnerability from cvelistv5
Published
2025-03-12 00:00
Modified
2025-03-12 19:49
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
zzskzy Warehouse Refinement Management System SaveCrash.ashx UploadCrash unrestricted upload
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.299288 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.299288 | signature, permissions-required | |
https://vuldb.com/?submit.512330 | third-party-advisory | |
https://github.com/f14g-orz/tmp/blob/main/3_.md | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
zzskzy | Warehouse Refinement Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2216", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-12T15:33:50.264157Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-12T19:49:18.407Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Warehouse Refinement Management System", "vendor": "zzskzy", "versions": [ { "status": "affected", "version": "1.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "f14g (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in zzskzy Warehouse Refinement Management System 1.3. Affected by this issue is the function UploadCrash of the file /crash/log/SaveCrash.ashx. The manipulation of the argument file leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "Eine kritische Schwachstelle wurde in zzskzy Warehouse Refinement Management System 1.3 entdeckt. Betroffen davon ist die Funktion UploadCrash der Datei /crash/log/SaveCrash.ashx. Dank der Manipulation des Arguments file mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "Unrestricted Upload", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-12T00:00:09.848Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-299288 | zzskzy Warehouse Refinement Management System SaveCrash.ashx UploadCrash unrestricted upload", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.299288" }, { "name": "VDB-299288 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.299288" }, { "name": "Submit #512330 | www.zzskzy.com Refined warehousing management system v1.3 RCE", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.512330" }, { "tags": [ "exploit" ], "url": "https://github.com/f14g-orz/tmp/blob/main/3_.md" } ], "timeline": [ { "lang": "en", "time": "2025-03-11T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-11T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-11T16:12:37.000Z", "value": "VulDB entry last update" } ], "title": "zzskzy Warehouse Refinement Management System SaveCrash.ashx UploadCrash unrestricted upload" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2216", "datePublished": "2025-03-12T00:00:09.848Z", "dateReserved": "2025-03-11T15:07:28.651Z", "dateUpdated": "2025-03-12T19:49:18.407Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2217
Vulnerability from cvelistv5
Published
2025-03-12 00:00
Modified
2025-03-12 16:19
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
zzskzy Warehouse Refinement Management System getAdyData.ashx ProcessRequest sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.299289 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.299289 | signature, permissions-required | |
https://vuldb.com/?submit.512333 | third-party-advisory | |
https://github.com/Rain1er/report/blob/main/skWMX/5.md | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
zzskzy | Warehouse Refinement Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2217", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-12T16:18:26.326240Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-12T16:19:57.861Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Warehouse Refinement Management System", "vendor": "zzskzy", "versions": [ { "status": "affected", "version": "1.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "xiao9cc (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in zzskzy Warehouse Refinement Management System 1.3. This affects the function ProcessRequest of the file /getAdyData.ashx. The manipulation of the argument showid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "Es wurde eine kritische Schwachstelle in zzskzy Warehouse Refinement Management System 1.3 gefunden. Betroffen hiervon ist die Funktion ProcessRequest der Datei /getAdyData.ashx. Dank Manipulation des Arguments showid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "SQL Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-12T00:00:11.806Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-299289 | zzskzy Warehouse Refinement Management System getAdyData.ashx ProcessRequest sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.299289" }, { "name": "VDB-299289 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.299289" }, { "name": "Submit #512333 | www.zzskzy.com Refined warehousing management system v1.3 RCE", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.512333" }, { "tags": [ "exploit" ], "url": "https://github.com/Rain1er/report/blob/main/skWMX/5.md" } ], "timeline": [ { "lang": "en", "time": "2025-03-11T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-11T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-11T16:12:38.000Z", "value": "VulDB entry last update" } ], "title": "zzskzy Warehouse Refinement Management System getAdyData.ashx ProcessRequest sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2217", "datePublished": "2025-03-12T00:00:11.806Z", "dateReserved": "2025-03-11T15:07:30.862Z", "dateUpdated": "2025-03-12T16:19:57.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2115
Vulnerability from cvelistv5
Published
2025-03-09 05:31
Modified
2025-03-10 15:46
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
zzskzy Warehouse Refinement Management System AcceptZip.ashx ProcessRequest unrestricted upload
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.299010 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.299010 | signature, permissions-required | |
https://vuldb.com/?submit.506655 | third-party-advisory | |
https://github.com/heiheixz/report/blob/main/sk_1.md | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
zzskzy | Warehouse Refinement Management System |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2115", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-10T15:45:59.060109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-10T15:46:17.501Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/heiheixz/report/blob/main/sk_1.md" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Warehouse Refinement Management System", "vendor": "zzskzy", "versions": [ { "status": "affected", "version": "3.1" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "heihei_XZ (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in zzskzy Warehouse Refinement Management System 3.1. Affected is the function ProcessRequest of the file /AcceptZip.ashx. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in zzskzy Warehouse Refinement Management System 3.1 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion ProcessRequest der Datei /AcceptZip.ashx. Durch Manipulieren des Arguments file mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "Unrestricted Upload", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-09T05:31:04.443Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-299010 | zzskzy Warehouse Refinement Management System AcceptZip.ashx ProcessRequest unrestricted upload", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.299010" }, { "name": "VDB-299010 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.299010" }, { "name": "Submit #506655 | www.zzskzy.com Warehouse refinement management system v3.1 RCE", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.506655" }, { "tags": [ "exploit" ], "url": "https://github.com/heiheixz/report/blob/main/sk_1.md" } ], "timeline": [ { "lang": "en", "time": "2025-03-08T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-08T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-08T08:35:46.000Z", "value": "VulDB entry last update" } ], "title": "zzskzy Warehouse Refinement Management System AcceptZip.ashx ProcessRequest unrestricted upload" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2115", "datePublished": "2025-03-09T05:31:04.443Z", "dateReserved": "2025-03-08T07:30:43.570Z", "dateUpdated": "2025-03-10T15:46:17.501Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }