CVE-2024-1258
low-risk
Published 2024-02-06
A vulnerability was found in Juanpao JPShop up to 1.5.02. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file api/config/params.php of the component API. The manipulation of the argument JWT_KEY_ADMIN leads to use of hard-coded cryptographic key . The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-252997 was assigned to this vulnerability.
Do I need to act?
-
0.09% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.1/10
Low
ADJACENT_NETWORK
/ HIGH complexity
Affected Products (1)
Jpshop
Affected Vendors
References (8)
Broken Link
https://note.zhaoj.in/share/XblX1My7jNV7
Permissions Required
https://vuldb.com/?ctiid.252997
Third Party Advisory
https://vuldb.com/?id.252997
Broken Link
https://note.zhaoj.in/share/XblX1My7jNV7
Permissions Required
https://vuldb.com/?ctiid.252997
Third Party Advisory
https://vuldb.com/?id.252997
13
/ 100
low-risk
Severity
8/34 · Low
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal