Lucene search

K
cvelistVulDBCVELIST:CVE-2024-0739
HistoryJan 19, 2024 - 10:00 p.m.

CVE-2024-0739 Hecheng Leadshop leadshop.php deserialization

2024-01-1922:00:04
CWE-502
VulDB
www.cve.org
1
hecheng leadshop
deserialization
critical vulnerability
leadshop.php
remote attack
vdb-251562

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

9.8

Confidence

High

EPSS

0.001

Percentile

28.0%

A vulnerability, which was classified as critical, was found in Hecheng Leadshop up to 1.4.20. Affected is an unknown function of the file /web/leadshop.php. The manipulation of the argument install leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-251562 is the identifier assigned to this vulnerability.

CNA Affected

[
  {
    "vendor": "Hecheng",
    "product": "Leadshop",
    "versions": [
      {
        "version": "1.4.0",
        "status": "affected"
      },
      {
        "version": "1.4.1",
        "status": "affected"
      },
      {
        "version": "1.4.2",
        "status": "affected"
      },
      {
        "version": "1.4.3",
        "status": "affected"
      },
      {
        "version": "1.4.4",
        "status": "affected"
      },
      {
        "version": "1.4.5",
        "status": "affected"
      },
      {
        "version": "1.4.6",
        "status": "affected"
      },
      {
        "version": "1.4.7",
        "status": "affected"
      },
      {
        "version": "1.4.8",
        "status": "affected"
      },
      {
        "version": "1.4.9",
        "status": "affected"
      },
      {
        "version": "1.4.10",
        "status": "affected"
      },
      {
        "version": "1.4.11",
        "status": "affected"
      },
      {
        "version": "1.4.12",
        "status": "affected"
      },
      {
        "version": "1.4.13",
        "status": "affected"
      },
      {
        "version": "1.4.14",
        "status": "affected"
      },
      {
        "version": "1.4.15",
        "status": "affected"
      },
      {
        "version": "1.4.16",
        "status": "affected"
      },
      {
        "version": "1.4.17",
        "status": "affected"
      },
      {
        "version": "1.4.18",
        "status": "affected"
      },
      {
        "version": "1.4.19",
        "status": "affected"
      },
      {
        "version": "1.4.20",
        "status": "affected"
      }
    ]
  }
]

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

9.8

Confidence

High

EPSS

0.001

Percentile

28.0%

Related for CVELIST:CVE-2024-0739