Lucene search

K
cveVulDBCVE-2024-0739
HistoryJan 19, 2024 - 10:15 p.m.

CVE-2024-0739

2024-01-1922:15:08
CWE-502
VulDB
web.nvd.nist.gov
18
cve-2024-0739
hecheng leadshop
deserialization
remote attack
vdb-251562
nvd

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.001

Percentile

28.0%

A vulnerability, which was classified as critical, was found in Hecheng Leadshop up to 1.4.20. Affected is an unknown function of the file /web/leadshop.php. The manipulation of the argument install leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-251562 is the identifier assigned to this vulnerability.

Affected configurations

Nvd
Vulners
Node
leadshopleadshopRange1.4.01.4.20
VendorProductVersionCPE
leadshopleadshop*cpe:2.3:a:leadshop:leadshop:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Hecheng",
    "product": "Leadshop",
    "versions": [
      {
        "version": "1.4.0",
        "status": "affected"
      },
      {
        "version": "1.4.1",
        "status": "affected"
      },
      {
        "version": "1.4.2",
        "status": "affected"
      },
      {
        "version": "1.4.3",
        "status": "affected"
      },
      {
        "version": "1.4.4",
        "status": "affected"
      },
      {
        "version": "1.4.5",
        "status": "affected"
      },
      {
        "version": "1.4.6",
        "status": "affected"
      },
      {
        "version": "1.4.7",
        "status": "affected"
      },
      {
        "version": "1.4.8",
        "status": "affected"
      },
      {
        "version": "1.4.9",
        "status": "affected"
      },
      {
        "version": "1.4.10",
        "status": "affected"
      },
      {
        "version": "1.4.11",
        "status": "affected"
      },
      {
        "version": "1.4.12",
        "status": "affected"
      },
      {
        "version": "1.4.13",
        "status": "affected"
      },
      {
        "version": "1.4.14",
        "status": "affected"
      },
      {
        "version": "1.4.15",
        "status": "affected"
      },
      {
        "version": "1.4.16",
        "status": "affected"
      },
      {
        "version": "1.4.17",
        "status": "affected"
      },
      {
        "version": "1.4.18",
        "status": "affected"
      },
      {
        "version": "1.4.19",
        "status": "affected"
      },
      {
        "version": "1.4.20",
        "status": "affected"
      }
    ]
  }
]

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.001

Percentile

28.0%

Related for CVE-2024-0739