Search criteria
3 vulnerabilities by jeanmarc77
CVE-2024-9275 (GCVE-0-2024-9275)
Vulnerability from cvelistv5 – Published: 2024-09-27 10:31 – Updated: 2024-09-27 15:39
VLAI?
Title
jeanmarc77 123solar admin_invt2.php file inclusion
Summary
A vulnerability was found in jeanmarc77 123solar up to 1.8.4.5. It has been rated as critical. This issue affects some unknown processing of the file /admin/admin_invt2.php. The manipulation of the argument PROTOCOLx leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity ?
6.3 (Medium)
6.3 (Medium)
CWE
- CWE-73 - File Inclusion
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| jeanmarc77 | 123solar |
Affected:
1.8.4.0
Affected: 1.8.4.1 Affected: 1.8.4.2 Affected: 1.8.4.3 Affected: 1.8.4.4 Affected: 1.8.4.5 |
Credits
hejiasheng (VulDB User)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:jeanmarc77:123solar:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "123solar",
"vendor": "jeanmarc77",
"versions": [
{
"lessThanOrEqual": "1.8.4.5",
"status": "affected",
"version": "1.8.4.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-9275",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-27T15:37:42.876252Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-27T15:39:36.388Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "123solar",
"vendor": "jeanmarc77",
"versions": [
{
"status": "affected",
"version": "1.8.4.0"
},
{
"status": "affected",
"version": "1.8.4.1"
},
{
"status": "affected",
"version": "1.8.4.2"
},
{
"status": "affected",
"version": "1.8.4.3"
},
{
"status": "affected",
"version": "1.8.4.4"
},
{
"status": "affected",
"version": "1.8.4.5"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "hejiasheng (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in jeanmarc77 123solar up to 1.8.4.5. It has been rated as critical. This issue affects some unknown processing of the file /admin/admin_invt2.php. The manipulation of the argument PROTOCOLx leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in jeanmarc77 123solar bis 1.8.4.5 ausgemacht. Sie wurde als kritisch eingestuft. Dies betrifft einen unbekannten Teil der Datei /admin/admin_invt2.php. Mittels dem Manipulieren des Arguments PROTOCOLx mit unbekannten Daten kann eine file inclusion-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-73",
"description": "File Inclusion",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-27T10:31:04.525Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-278657 | jeanmarc77 123solar admin_invt2.php file inclusion",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.278657"
},
{
"name": "VDB-278657 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.278657"
},
{
"name": "Submit #408326 | 123Solar 1.8.4.5 File Inclusion",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.408326"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/jeanmarc77/123solar/issues/75"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-09-27T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-09-27T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-09-27T07:15:32.000Z",
"value": "VulDB entry last update"
}
],
"title": "jeanmarc77 123solar admin_invt2.php file inclusion"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-9275",
"datePublished": "2024-09-27T10:31:04.525Z",
"dateReserved": "2024-09-27T05:09:53.918Z",
"dateUpdated": "2024-09-27T15:39:36.388Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-9007 (GCVE-0-2024-9007)
Vulnerability from cvelistv5 – Published: 2024-09-19 22:31 – Updated: 2024-09-20 13:39
VLAI?
Title
jeanmarc77 123solar detailed.php cross site scripting
Summary
A vulnerability classified as problematic has been found in jeanmarc77 123solar 1.8.4.5. This affects an unknown part of the file /detailed.php. The manipulation of the argument date1 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named 94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f. It is recommended to apply a patch to fix this issue.
Severity ?
CWE
- CWE-79 - Cross Site Scripting
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| jeanmarc77 | 123solar |
Affected:
1.8.4.5
|
Credits
hejiasheng (VulDB User)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "123solar",
"vendor": "jeanmarc77",
"versions": [
{
"status": "affected",
"version": "1.8.4.5"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-9007",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-20T13:36:52.425281Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-20T13:39:09.819Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "123solar",
"vendor": "jeanmarc77",
"versions": [
{
"status": "affected",
"version": "1.8.4.5"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "hejiasheng (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in jeanmarc77 123solar 1.8.4.5. This affects an unknown part of the file /detailed.php. The manipulation of the argument date1 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named 94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f. It is recommended to apply a patch to fix this issue."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in jeanmarc77 123solar 1.8.4.5 entdeckt. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /detailed.php. Mittels Manipulieren des Arguments date1 mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als 94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "Cross Site Scripting",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-19T22:31:07.360Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-278163 | jeanmarc77 123solar detailed.php cross site scripting",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.278163"
},
{
"name": "VDB-278163 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.278163"
},
{
"name": "Submit #408299 | 123Solar 1.8.4.5 Cross Site Scripting",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.408299"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/jeanmarc77/123solar/issues/73"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/jeanmarc77/123solar/issues/73#issuecomment-2357648077"
},
{
"tags": [
"patch"
],
"url": "https://github.com/jeanmarc77/123solar/commit/94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-09-19T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-09-19T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-09-19T18:00:27.000Z",
"value": "VulDB entry last update"
}
],
"title": "jeanmarc77 123solar detailed.php cross site scripting"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-9007",
"datePublished": "2024-09-19T22:31:07.360Z",
"dateReserved": "2024-09-19T15:55:15.446Z",
"dateUpdated": "2024-09-20T13:39:09.819Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-9006 (GCVE-0-2024-9006)
Vulnerability from cvelistv5 – Published: 2024-09-19 22:31 – Updated: 2024-09-20 13:40
VLAI?
Title
jeanmarc77 123solar config_invt1.php code injection
Summary
A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is recommended to apply a patch to fix this issue.
Severity ?
6.3 (Medium)
6.3 (Medium)
CWE
- CWE-94 - Code Injection
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| jeanmarc77 | 123solar |
Affected:
1.8.4.5
|
Credits
hejiasheng (VulDB User)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:jeanmarc77:123solar:1.8.4.5:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "123solar",
"vendor": "jeanmarc77",
"versions": [
{
"status": "affected",
"version": "1.8.4.5"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-9006",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-20T13:39:37.702664Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-20T13:40:09.596Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "123solar",
"vendor": "jeanmarc77",
"versions": [
{
"status": "affected",
"version": "1.8.4.5"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "hejiasheng (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is recommended to apply a patch to fix this issue."
},
{
"lang": "de",
"value": "Eine kritische Schwachstelle wurde in jeanmarc77 123solar 1.8.4.5 ausgemacht. Dies betrifft einen unbekannten Teil der Datei config/config_invt1.php. Mittels dem Manipulieren des Arguments PASSOx mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als f4a8c748ec436e5a79f91ccb6a6f73752b336aa5 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "Code Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-19T22:31:05.103Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-278162 | jeanmarc77 123solar config_invt1.php code injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.278162"
},
{
"name": "VDB-278162 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.278162"
},
{
"name": "Submit #408298 | jeanmarc77 123Solar 1.8.4.5 Code Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.408298"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/jeanmarc77/123solar/issues/74"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/jeanmarc77/123solar/issues/74#issuecomment-2357653441"
},
{
"tags": [
"patch"
],
"url": "https://github.com/jeanmarc77/123solar/commit/f4a8c748ec436e5a79f91ccb6a6f73752b336aa5"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-09-19T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-09-19T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-09-19T18:00:25.000Z",
"value": "VulDB entry last update"
}
],
"title": "jeanmarc77 123solar config_invt1.php code injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-9006",
"datePublished": "2024-09-19T22:31:05.103Z",
"dateReserved": "2024-09-19T15:55:13.224Z",
"dateUpdated": "2024-09-20T13:40:09.596Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}