CVE-2024-12358

A vulnerability was found in WeiYe-Jing datax-web 2.1.1. It has been classified as critical. This affects an unknown part of the file /api/job/add/. The manipulation of the argument glueSource leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/jxp98/VulResearch/blob/main/2024/12/1.Datax-Web%20-%20Remote%20Code%20Execution.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.287277 Permissions Required VDB Entry
https://vuldb.com/?id.287277 Third Party Advisory VDB Entry
https://vuldb.com/?submit.457865 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:datax-web_project:datax-web:2.1.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-12-09 05:15

Updated : 2024-12-10 23:34


NVD link : CVE-2024-12358

Mitre link : CVE-2024-12358

CVE.ORG link : CVE-2024-12358


JSON object : View

Products Affected

datax-web_project

  • datax-web
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')