RuoYi v4.8.0 was discovered to allow unauthorized attackers to view the session ID of the admin in the system monitoring. This issue can allow attackers to impersonate Admin users via using a crafted cookie.
References
| Link | Resource |
|---|---|
| https://github.com/peccc/restful_vul/blob/main/ruoyi_elevation_of_privileges/ruoyi_elevation_of_privileges.md | Exploit Third Party Advisory |
| https://github.com/yangzongzhuan/RuoYi | Product |
| https://ruoyi.vip/ | Product |
| https://github.com/peccc/restful_vul/blob/main/ruoyi_elevation_of_privileges/ruoyi_elevation_of_privileges.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-01-29 15:15
Updated : 2025-05-14 18:26
NVD link : CVE-2024-57436
Mitre link : CVE-2024-57436
CVE.ORG link : CVE-2024-57436
JSON object : View
Products Affected
ruoyi
- ruoyi
CWE
CWE-922
Insecure Storage of Sensitive Information
