CVE-2024-7314
CRITICAL EXPLOITED NUCLEIAnji-plus Report < 1.4.1 - Authentication Bypass
Title source: ruleDescription
anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
Nuclei Templates (1)
AJ-Report < 1.4.1 - Remote Code Execution
CRITICALVERIFIEDby ritikchaddha
Shodan:
http.title:"AJ-Report"
FOFA:
app="AJ-Report"
References (4)
Scores
CVSS v3
9.8
EPSS
0.7010
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-05-27
CWE
CWE-288
Status
published
Products (1)
anji-plus/report
< 1.4.1
Published
Aug 02, 2024
Tracked Since
Feb 18, 2026