CNVD-2022-09782

Vulnerability from cnvd - Published: 2022-02-11
VLAI Severity ?
Title
PayPal Free Source Code访问控制错误漏洞
Description
PayPal Free Source Code是一个在线注册管理系统。 PayPal Free Source Code存在访问控制错误漏洞,该漏洞源于产品在获取PHP and PayPal Free Source 1.0 产品代码时未对权限做有效验证,攻击者可利用该漏洞获得特权。
Severity
Patch Name
PayPal Free Source Code访问控制错误漏洞的补丁
Patch Description
PayPal Free Source Code是一个在线注册管理系统。 PayPal Free Source Code存在访问控制错误漏洞,该漏洞源于产品在获取PHP and PayPal Free Source 1.0 产品代码时未对权限做有效验证,攻击者可利用该漏洞获得特权。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://www.sourcecodester.com/

Reference
https://nvd.nist.gov/vuln/detail/CVE-2021-40579
Impacted products
Name
PayPal Free Source Code PayPal Free Source Code 1.0
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2021-40579"
    }
  },
  "description": "PayPal Free Source Code\u662f\u4e00\u4e2a\u5728\u7ebf\u6ce8\u518c\u7ba1\u7406\u7cfb\u7edf\u3002\n\nPayPal Free Source Code\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4ea7\u54c1\u5728\u83b7\u53d6PHP and PayPal Free Source 1.0 \u4ea7\u54c1\u4ee3\u7801\u65f6\u672a\u5bf9\u6743\u9650\u505a\u6709\u6548\u9a8c\u8bc1\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u5f97\u7279\u6743\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.sourcecodester.com/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-09782",
  "openTime": "2022-02-11",
  "patchDescription": "PayPal Free Source Code\u662f\u4e00\u4e2a\u5728\u7ebf\u6ce8\u518c\u7ba1\u7406\u7cfb\u7edf\u3002\r\n\r\nPayPal Free Source Code\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4ea7\u54c1\u5728\u83b7\u53d6PHP and PayPal Free Source 1.0 \u4ea7\u54c1\u4ee3\u7801\u65f6\u672a\u5bf9\u6743\u9650\u505a\u6709\u6548\u9a8c\u8bc1\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u5f97\u7279\u6743\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "PayPal Free Source Code\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "PayPal Free Source Code PayPal Free Source Code 1.0"
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-40579",
  "serverity": "\u4e2d",
  "submitTime": "2021-12-29",
  "title": "PayPal Free Source Code\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…