RuoYi v4.8.0 was discovered to allow unauthorized attackers to view the session ID of the admin in the system monitoring. This issue can allow attackers to impersonate Admin users via using a crafted cookie.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/peccc/restful_vul/blob/main/ruoyi_elevation_of_privileges/ruoyi_elevation_of_privileges.md | Exploit Third Party Advisory |
https://github.com/peccc/restful_vul/blob/main/ruoyi_elevation_of_privileges/ruoyi_elevation_of_privileges.md | Exploit Third Party Advisory |
https://github.com/yangzongzhuan/RuoYi | Product |
https://ruoyi.vip/ | Product |
Configurations
History
14 May 2025, 18:26
Type | Values Removed | Values Added |
---|---|---|
First Time |
Ruoyi
Ruoyi ruoyi |
|
CPE | cpe:2.3:a:ruoyi:ruoyi:4.8.0:*:*:*:*:*:*:* | |
References | () https://github.com/peccc/restful_vul/blob/main/ruoyi_elevation_of_privileges/ruoyi_elevation_of_privileges.md - Exploit, Third Party Advisory | |
References | () https://github.com/yangzongzhuan/RuoYi - Product | |
References | () https://ruoyi.vip/ - Product |
29 Jan 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-29 15:15
Updated : 2025-05-14 18:26
NVD link : CVE-2024-57436
Mitre link : CVE-2024-57436
JSON object : View
Products Affected
ruoyi
- ruoyi
CWE
No CWE.