Required CVE Record Information
Description
A vulnerability was found in Lingxing ERP 2 and classified as critical. Affected by this issue is the function DoUpload of the file /Api/FileUpload.ashx?method=DoUpload. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment.
CVSS 4 Total
Score | Severity | Version | Vector String |
---|---|---|---|
6.9 | MEDIUM | 4.0 | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N |
7.3 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
7.3 | HIGH | 3.0 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
7.5 | — | 2.0 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Credits
- 207556249 (VulDB User) reporter
References 4 Total
- vuldb.com: VDB-304592 | Lingxing ERP FileUpload.ashx DoUpload unrestricted upload vdb-entrytechnical-description
- vuldb.com: VDB-304592 | CTI Indicators (IOB, IOC, TTP, IOA) signaturepermissions-required
- vuldb.com: Submit #547878 | vendor https://www.lingxing.com/ v2 remote code execution third-party-advisory
- https://github.com/666lail/report/blob/main/tmp/fileUpload_1.md exploit