Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
feiyuchuixue sz-boot-parent API Endpoint sys-message authorization
Vulnerability Description
A vulnerability was found in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected is an unknown function of the file /api/admin/sys-message/ of the component API Endpoint. The manipulation of the argument messageId results in authorization bypass. The attack can be launched remotely. The exploit has been made public and could be used. Upgrading to version 1.3.3-beta is able to address this issue. The patch is identified as aefaabfd7527188bfba3c8c9eee17c316d094802. The affected component should be upgraded. The project was informed beforehand and acted very professional: "We have implemented message ownership verification, so that users can only query messages related to themselves."
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
通过用户控制密钥绕过授权机制
Vulnerability Title
Sz-Admin 安全漏洞
Vulnerability Description
Sz-Admin是INS6+个人开发者的一个中后台管理软件。 Sz-Admin 1.3.2-beta及之前版本存在安全漏洞,该漏洞源于对文件/api/admin/sys-message/中参数messageId的错误操作,可能导致授权绕过。
CVSS Information
N/A
Vulnerability Type
N/A