Xstream API remote code execution vulnerabilit
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
type | query param | /openmrs-standalone/module/reporting/definition/saveSerializedDefinition.form | The endpoint allows unauthenticated remote code execution through XML input manipulation, leveraging CVE-2013-7285 in the XStream library. | CWE-78 |
serializationClass | query param | /openmrs-standalone/module/reporting/definition/saveSerializedDefinition.form | The endpoint allows unauthenticated remote code execution through XML input manipulation, leveraging CVE-2013-7285 in the XStream library. | CWE-78 |
serializedData | query param | /openmrs-standalone/module/reporting/definition/saveSerializedDefinition.form | The endpoint allows unauthenticated remote code execution through XML input manipulation, leveraging CVE-2013-7285 in the XStream library. | CWE-78 |
uuid | query param | /openmrs-standalone/module/reporting/definition/saveSerializedDefinition.form | The endpoint allows unauthenticated remote code execution through XML input manipulation, leveraging CVE-2013-7285 in the XStream library. | CWE-78 |
name | query param | /openmrs-standalone/module/reporting/definition/saveSerializedDefinition.form | The endpoint allows unauthenticated remote code execution through XML input manipulation, leveraging CVE-2013-7285 in the XStream library. | CWE-78 |
subtype | query param | /openmrs-standalone/module/reporting/definition/saveSerializedDefinition.form | The endpoint allows unauthenticated remote code execution through XML input manipulation, leveraging CVE-2013-7285 in the XStream library. | CWE-78 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo