All the vulnerabilites related to linlinjava - litemall
cve-2024-46382
Vulnerability from cvelistv5
Published
2024-09-19 00:00
Modified
2024-09-19 13:58
Severity ?
EPSS score ?
Summary
A SQL injection vulnerability in linlinjava litemall 1.8.0 allows a remote attacker to obtain sensitive information via the goodsId, goodsSn, and name parameters in AdminGoodscontroller.java.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:litemall_project:litemall:1.8:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "litemall", "vendor": "litemall_project", "versions": [ { "status": "affected", "version": "1.8.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-46382", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:57:30.070402Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:58:40.845Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in linlinjava litemall 1.8.0 allows a remote attacker to obtain sensitive information via the goodsId, goodsSn, and name parameters in AdminGoodscontroller.java." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:03:22.347437", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/linlinjava/litemall/issues/552" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-46382", "datePublished": "2024-09-19T00:00:00", "dateReserved": "2024-09-11T00:00:00", "dateUpdated": "2024-09-19T13:58:40.845Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6452
Vulnerability from cvelistv5
Published
2024-07-02 20:00
Modified
2024-08-01 21:41
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
linlinjava litemall AdminGoodscontroller.java sql injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.270235 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.270235 | signature, permissions-required | |
https://vuldb.com/?submit.367635 | third-party-advisory | |
https://github.com/linlinjava/litemall/issues/548 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
linlinjava | litemall |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:litemall_project:litemall:1.0.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:litemall_project:litemall:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:litemall_project:litemall:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:litemall_project:litemall:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:litemall_project:litemall:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:litemall_project:litemall:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:litemall_project:litemall:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:litemall_project:litemall:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:litemall_project:litemall:1.8:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "litemall", "vendor": "litemall_project", "versions": [ { "status": "affected", "version": "1.0.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "1.3" }, { "status": "affected", "version": "1.4" }, { "status": "affected", "version": "1.5" }, { "status": "affected", "version": "1.6" }, { "status": "affected", "version": "1.7" }, { "status": "affected", "version": "1.8" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6452", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T14:44:51.071901Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T17:05:00.777Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:41:03.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VDB-270235 | linlinjava litemall AdminGoodscontroller.java sql injection", "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.270235" }, { "name": "VDB-270235 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.270235" }, { "name": "Submit #367635 | linlinjava litemall v1.8.0 SQL Injection", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://vuldb.com/?submit.367635" }, { "tags": [ "exploit", "issue-tracking", "x_transferred" ], "url": "https://github.com/linlinjava/litemall/issues/548" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "litemall", "vendor": "linlinjava", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "1.3" }, { "status": "affected", "version": "1.4" }, { "status": "affected", "version": "1.5" }, { "status": "affected", "version": "1.6" }, { "status": "affected", "version": "1.7" }, { "status": "affected", "version": "1.8" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Tmac (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in linlinjava litemall up to 1.8.0. Affected by this vulnerability is an unknown functionality of the file AdminGoodscontroller.java. The manipulation of the argument goodsId/goodsSn/name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270235." }, { "lang": "de", "value": "In linlinjava litemall bis 1.8.0 wurde eine kritische Schwachstelle entdeckt. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei AdminGoodscontroller.java. Durch das Beeinflussen des Arguments goodsId/goodsSn/name mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T20:00:05.322Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-270235 | linlinjava litemall AdminGoodscontroller.java sql injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.270235" }, { "name": "VDB-270235 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.270235" }, { "name": "Submit #367635 | linlinjava litemall v1.8.0 SQL Injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.367635" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/linlinjava/litemall/issues/548" } ], "timeline": [ { "lang": "en", "time": "2024-07-02T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2024-07-02T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2024-07-02T15:23:36.000Z", "value": "VulDB entry last update" } ], "title": "linlinjava litemall AdminGoodscontroller.java sql injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2024-6452", "datePublished": "2024-07-02T20:00:05.322Z", "dateReserved": "2024-07-02T13:18:25.849Z", "dateUpdated": "2024-08-01T21:41:03.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6702
Vulnerability from cvelistv5
Published
2025-06-26 16:00
Modified
2025-06-27 13:18
Severity ?
2.1 (Low) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RC:R
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RC:R
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RC:R
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RC:R
EPSS score ?
Summary
linlinjava litemall post improper authorization
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313968 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313968 | signature, permissions-required | |
https://vuldb.com/?submit.597473 | third-party-advisory | |
https://ctf-n0el4kls.notion.site/Litemall-Mass-Assignment-Vulnerability-in-wx-comment-post-21441990f447808b86d1cb15e37ecae9?source=copy_link | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
linlinjava | litemall |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6702", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-27T13:18:19.864341Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-27T13:18:23.188Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://ctf-n0el4kls.notion.site/Litemall-Mass-Assignment-Vulnerability-in-wx-comment-post-21441990f447808b86d1cb15e37ecae9" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "litemall", "vendor": "linlinjava", "versions": [ { "status": "affected", "version": "1.8.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "n0el4kls (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in linlinjava litemall 1.8.0. Affected is an unknown function of the file /wx/comment/post. The manipulation of the argument adminComment leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in linlinjava litemall 1.8.0 gefunden. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /wx/comment/post. Mittels Manipulieren des Arguments adminComment mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "Improper Authorization", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-266", "description": "Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-26T16:00:16.356Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313968 | linlinjava litemall post improper authorization", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313968" }, { "name": "VDB-313968 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313968" }, { "name": "Submit #597473 | linlinjava litemall 1.8.0 Improper Restriction of Write-Once Bit Fields", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.597473" }, { "tags": [ "exploit" ], "url": "https://ctf-n0el4kls.notion.site/Litemall-Mass-Assignment-Vulnerability-in-wx-comment-post-21441990f447808b86d1cb15e37ecae9?source=copy_link" } ], "timeline": [ { "lang": "en", "time": "2025-06-26T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-26T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-26T10:27:17.000Z", "value": "VulDB entry last update" } ], "title": "linlinjava litemall post improper authorization" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6702", "datePublished": "2025-06-26T16:00:16.356Z", "dateReserved": "2025-06-26T08:22:14.118Z", "dateUpdated": "2025-06-27T13:18:23.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }