Description
A vulnerability classified as problematic has been found in LitmusChaos Litmus up to 3.19.0. Affected is an unknown function. The manipulation leads to client-side enforcement of server-side security. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine problematische Schwachstelle in LitmusChaos Litmus bis 3.19.0 entdeckt. Es betrifft eine unbekannte Funktion. Dank Manipulation mit unbekannten Daten kann eine client-side enforcement of server-side security-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
Problem types
Client-Side Enforcement of Server-Side Security
Product status
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
3.15
3.16
3.17
3.18
3.19.0
Timeline
2025-08-09: | Advisory disclosed |
2025-08-09: | VulDB entry created |
2025-08-09: | VulDB entry last update |
Credits
maique (VulDB User)
References
vuldb.com/?id.319320 (VDB-319320 | LitmusChaos Litmus client-side enforcement of server-side security)
vuldb.com/?ctiid.319320 (VDB-319320 | CTI Indicators (IOB, IOC))
vuldb.com/?submit.625952 (Submit #625952 | Open-Source Web LitmusChaos 3.19.0 Input Validation Bypass)
github.com/MaiqueSilva/VulnDB/blob/main/README02.md