Information Exposure Affecting net.mingsoft:ms-mcms package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.11% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-NETMINGSOFT-6157534
  • published 16 Jan 2024
  • disclosed 16 Jan 2024
  • credit tanalala

How to fix?

There is no fixed version for net.mingsoft:ms-mcms.

Overview

Affected versions of this package are vulnerable to Information Exposure via a crafted script to the password parameter. An attacker can obtain sensitive information by sending a specially crafted request to the affected parameter.

PoC

@PostMapping(value = "/checkLogin")
    @ResponseBody
    public ResultData checkLogin(@ModelAttribute @ApiIgnore ManagerEntity manager, HttpServletRequest request, HttpServletResponse response) {
        LOG.debug("basic checkLogin");

        //验证码
        if (!(checkRandCode())) {
            return ResultData.build().error(getResString("err.error", this.getResString("rand.code")));
        }
        if(loginStrategy.login(manager)){
            return ResultData.build().success();
        }else {
            return ResultData.build().error(getResString("err.error", this.getResString("manager.name.or.password")));
        }

    }
}

protected boolean checkRandCode( String param) {
        if(!checkCode){
            return true;
        }
        String sessionCode = this.getRandCode();
        String requestCode = BasicUtil.getString(param);
        LOG.debug("session_code:" + sessionCode + " requestCode:" + requestCode);
        if (sessionCode.equalsIgnoreCase(requestCode)) {
            return true;
        }
        return false;
    }

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
7.5 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    None
Expand this section

NVD

7.5 high