anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
History

Sat, 22 Nov 2025 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Anji-plus aj-report
CPEs cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*
Vendors & Products Anji-plus aj-report

Thu, 20 Nov 2025 21:45:00 +0000

Type Values Removed Values Added
Description anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-19 UTC. anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

Thu, 20 Nov 2025 17:30:00 +0000

Type Values Removed Values Added
References

Thu, 20 Nov 2025 17:00:00 +0000

Type Values Removed Values Added
Description anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-19 UTC.

Thu, 25 Sep 2025 19:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-280

Thu, 25 Sep 2025 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-288

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.79351}

epss

{'score': 0.84565}


Tue, 17 Sep 2024 16:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-Other

Wed, 07 Aug 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Anji-plus
Anji-plus report
CPEs cpe:2.3:a:anji-plus:report:*:*:*:*:*:*:*:*
Vendors & Products Anji-plus
Anji-plus report
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2024-08-02T16:33:54.191Z

Updated: 2025-11-22T12:13:00.900Z

Reserved: 2024-07-30T20:15:25.496Z

Link: CVE-2024-7314

cve-icon Vulnrichment

Updated: 2024-08-07T15:51:18.034Z

cve-icon NVD

Status : Modified

Published: 2024-08-02T17:16:41.400

Modified: 2025-11-20T22:15:53.973

Link: CVE-2024-7314

cve-icon Redhat

No data.