Information Exposure Affecting net.mingsoft:ms-mcms package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.21% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-NETMINGSOFT-6157534
  • published16 Jan 2024
  • disclosed16 Jan 2024
  • credittanalala

Introduced: 16 Jan 2024

CVE-2023-51282  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

There is no fixed version for net.mingsoft:ms-mcms.

Overview

Affected versions of this package are vulnerable to Information Exposure via a crafted script to the password parameter. An attacker can obtain sensitive information by sending a specially crafted request to the affected parameter.

PoC

@PostMapping(value = "/checkLogin")
    @ResponseBody
    public ResultData checkLogin(@ModelAttribute @ApiIgnore ManagerEntity manager, HttpServletRequest request, HttpServletResponse response) {
        LOG.debug("basic checkLogin");

        //验证码
        if (!(checkRandCode())) {
            return ResultData.build().error(getResString("err.error", this.getResString("rand.code")));
        }
        if(loginStrategy.login(manager)){
            return ResultData.build().success();
        }else {
            return ResultData.build().error(getResString("err.error", this.getResString("manager.name.or.password")));
        }

    }
}

protected boolean checkRandCode( String param) {
        if(!checkCode){
            return true;
        }
        String sessionCode = this.getRandCode();
        String requestCode = BasicUtil.getString(param);
        LOG.debug("session_code:" + sessionCode + " requestCode:" + requestCode);
        if (sessionCode.equalsIgnoreCase(requestCode)) {
            return true;
        }
        return false;
    }

References

CVSS Scores

version 3.1