Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-7411

EPSS 73.89% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-7411

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Enalean Tuleap 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Enalean Tuleap是法国Enalean公司的一套开源的软件开发和项目管理工具。该工具提供企业应用程序生命周期管理,以及项目跟踪、源代码管理和团队协作等功能。 Enalean Tuleap 9.6及之前的版本中存在安全漏洞。攻击者可利用该漏洞注入任意的PHP对象,进一步实施多种攻击(不仅限于远程代码执行)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2017-7411

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-7411

Please Login to view more intelligence information

Same Patch Batch · n/a · 2017-10-30 · 29 CVEs total

CVE-2012-5357Ektron Content Management System 安全漏洞
CVE-2017-9450Amazon Web Services CloudFormation bootstrap工具包安全漏洞
CVE-2017-9377Barco ClickShare CSM-1 Base Unit和ClickShare CSC-1 Base Unit 命令注入漏洞
CVE-2017-15597Xen 安全漏洞
CVE-2017-12460Barco ClickShare CSM-1和ClickShare CSC-1 安全漏洞
CVE-2016-3090Apache Struts 2 安全漏洞
CVE-2015-7549QEMU 安全漏洞
CVE-2015-3249Apache Traffic Server 安全漏洞
CVE-2015-0226Apache WSS4J 加密问题漏洞
CVE-2015-0224Apache Qpid 代码问题漏洞
CVE-2014-3624Apache Traffic Server 安全漏洞
CVE-2014-3526Apache Wicket 安全漏洞
CVE-2013-4246Apache Subversion 安全漏洞
CVE-2012-5358Ektron Content Management System 安全漏洞
CVE-2017-1000255Power8 Linux kernel 安全漏洞
CVE-2017-15921WatchDog Anti-Malware和Online Security Pro zam32.sys驱动程序资源管理错误漏洞
CVE-2017-15920WatchDog Anti-Malware和Online Security Pro zam32.sys驱动程序资源管理错误漏洞
CVE-2014-0115Apache Storm 目录遍历漏洞
CVE-2012-0881Apache Xerces2 Java 安全漏洞
CVE-2009-1198Apache jUDDI 跨站脚本漏洞

Showing top 20 of 29 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-7411

No comments yet


Leave a comment