We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as critical was found in lenve VBlog up to 1.0.0. Affected by this vulnerability is the function configure of the file blogserver/src/main/java/org/sang/config/WebSecurityConfig.java. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
In lenve VBlog bis 1.0.0 wurde eine kritische Schwachstelle entdeckt. Dabei geht es um die Funktion configure der Datei blogserver/src/main/java/org/sang/config/WebSecurityConfig.java. Durch Beeinflussen mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
Incorrect Privilege Assignment
2025-04-07: | Advisory disclosed |
2025-04-07: | VulDB entry created |
2025-04-07: | VulDB entry last update |
s0l42 (VulDB User)
vuldb.com/?id.303643 (VDB-303643 | lenve VBlog WebSecurityConfig.java configure access control)
vuldb.com/?ctiid.303643 (VDB-303643 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.525609 (Submit #525609 | VBlog 1.0.0 Improper Authentication)
magnificent-dill-351.notion.site/...18ed80f2ace4fff7d1d51619
Support options