CWE-99
Improper Control of Resource Identifiers ('Resource Injection')
The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control.
CVE-2025-43491 (GCVE-0-2025-43491)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-43491", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-10T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-11T03:56:33.896Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Poly Lens", "vendor": "HP, Inc.", "versions": [ { "status": "affected", "version": "See HP security bulletin reference for affected versions" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA vulnerability in the Poly Lens Desktop application running on the Windows platform might allow modifications to the filesystem, which might lead to SYSTEM level privileges being granted.\u003c/span\u003e" } ], "value": "A vulnerability in the Poly Lens Desktop application running on the Windows platform might allow modifications to the filesystem, which might lead to SYSTEM level privileges being granted." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 7.3, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-99", "description": "CWE-99", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-09T20:29:47.968Z", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "url": "https://support.hp.com/us-en/document/ish_12979589-12979615-16/hpsbpy04048" } ], "source": { "discovery": "UNKNOWN" }, "title": "Poly Lens Desktop Application \u2013 Privilege Escalation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2025-43491", "datePublished": "2025-09-09T20:29:47.968Z", "dateReserved": "2025-04-16T15:25:24.713Z", "dateUpdated": "2025-09-11T03:56:33.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-8793 (GCVE-0-2025-8793)
Vulnerability from cvelistv5
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RC:R
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RC:R
- CWE-99 - Improper Control of Resource Identifiers
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.319321 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.319321 | signature, permissions-required | |
https://vuldb.com/?submit.625956 | third-party-advisory | |
https://github.com/MaiqueSilva/VulnDB/blob/main/readme03.md | exploit |
Vendor | Product | Version | ||
---|---|---|---|---|
LitmusChaos | Litmus |
Version: 3.0 Version: 3.1 Version: 3.2 Version: 3.3 Version: 3.4 Version: 3.5 Version: 3.6 Version: 3.7 Version: 3.8 Version: 3.9 Version: 3.10 Version: 3.11 Version: 3.12 Version: 3.13 Version: 3.14 Version: 3.15 Version: 3.16 Version: 3.17 Version: 3.18 Version: 3.19.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8793", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-13T15:07:15.466683Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-13T15:07:23.503Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/MaiqueSilva/VulnDB/blob/main/readme03.md" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Litmus", "vendor": "LitmusChaos", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.3" }, { "status": "affected", "version": "3.4" }, { "status": "affected", "version": "3.5" }, { "status": "affected", "version": "3.6" }, { "status": "affected", "version": "3.7" }, { "status": "affected", "version": "3.8" }, { "status": "affected", "version": "3.9" }, { "status": "affected", "version": "3.10" }, { "status": "affected", "version": "3.11" }, { "status": "affected", "version": "3.12" }, { "status": "affected", "version": "3.13" }, { "status": "affected", "version": "3.14" }, { "status": "affected", "version": "3.15" }, { "status": "affected", "version": "3.16" }, { "status": "affected", "version": "3.17" }, { "status": "affected", "version": "3.18" }, { "status": "affected", "version": "3.19.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "maique (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in LitmusChaos Litmus up to 3.19.0. Affected by this vulnerability is an unknown functionality. The manipulation of the argument projectID leads to improper control of resource identifiers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "In LitmusChaos Litmus bis 3.19.0 wurde eine problematische Schwachstelle entdeckt. Das betrifft eine unbekannte Funktionalit\u00e4t. Mit der Manipulation des Arguments projectID mit unbekannten Daten kann eine improper control of resource identifiers-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-99", "description": "Improper Control of Resource Identifiers", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-10T04:02:06.295Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-319321 | LitmusChaos Litmus resource injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.319321" }, { "name": "VDB-319321 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.319321" }, { "name": "Submit #625956 | Open-Source LitmusChaos 3.19.0 IDOR in Project Access Control", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.625956" }, { "tags": [ "exploit" ], "url": "https://github.com/MaiqueSilva/VulnDB/blob/main/readme03.md" } ], "timeline": [ { "lang": "en", "time": "2025-08-09T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-08-09T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-08-09T07:39:27.000Z", "value": "VulDB entry last update" } ], "title": "LitmusChaos Litmus resource injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-8793", "datePublished": "2025-08-10T04:02:06.295Z", "dateReserved": "2025-08-09T05:34:00.304Z", "dateUpdated": "2025-08-13T15:07:23.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-9263 (GCVE-0-2025-9263)
Vulnerability from cvelistv5
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RC:R
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RC:R
- CWE-99 - Improper Control of Resource Identifiers
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.320805 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.320805 | signature, permissions-required | |
https://vuldb.com/?submit.631704 | third-party-advisory | |
https://github.com/xuxueli/xxl-job/issues/3772 | issue-tracking | |
https://github.com/xuxueli/xxl-job/issues/3772#issue-3308329205 | exploit, issue-tracking |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-9263", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-21T13:40:24.358343Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-21T14:47:19.732Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/xuxueli/xxl-job/issues/3772" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "xxl-job", "vendor": "Xuxueli", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "ez-lbz (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Xuxueli xxl-job up to 3.1.1. Affected by this vulnerability is the function getJobsByGroup of the file /src/main/java/com/xxl/job/admin/controller/JobLogController.java. Such manipulation of the argument jobGroup leads to improper control of resource identifiers. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in Xuxueli xxl-job bis 3.1.1 entdeckt. Betroffen hiervon ist die Funktion getJobsByGroup der Datei /src/main/java/com/xxl/job/admin/controller/JobLogController.java. Durch das Beeinflussen des Arguments jobGroup mit unbekannten Daten kann eine improper control of resource identifiers-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgef\u00fchrt werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-99", "description": "Improper Control of Resource Identifiers", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-20T23:02:09.629Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-320805 | Xuxueli xxl-job JobLogController.java getJobsByGroup resource injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.320805" }, { "name": "VDB-320805 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.320805" }, { "name": "Submit #631704 | xuxueli xxl-job \u2264 3.1.1 IDOR", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.631704" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3772" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3772#issue-3308329205" } ], "timeline": [ { "lang": "en", "time": "2025-08-20T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-08-20T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-08-20T16:22:32.000Z", "value": "VulDB entry last update" } ], "title": "Xuxueli xxl-job JobLogController.java getJobsByGroup resource injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-9263", "datePublished": "2025-08-20T23:02:09.629Z", "dateReserved": "2025-08-20T14:17:13.800Z", "dateUpdated": "2025-08-21T14:47:19.732Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-9264 (GCVE-0-2025-9264)
Vulnerability from cvelistv5
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RC:R
5.4 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RC:R
- CWE-99 - Improper Control of Resource Identifiers
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.320806 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.320806 | signature, permissions-required | |
https://vuldb.com/?submit.631728 | third-party-advisory | |
https://github.com/xuxueli/xxl-job/issues/3773 | issue-tracking | |
https://github.com/xuxueli/xxl-job/issues/3773#issue-3308389841 | exploit, issue-tracking |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-9264", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-21T13:41:38.935624Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-21T14:47:12.747Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/xuxueli/xxl-job/issues/3773" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "Jobs Handler" ], "product": "xxl-job", "vendor": "Xuxueli", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "ez-lbz (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Xuxueli xxl-job up to 3.1.1. Affected by this issue is the function remove of the file /src/main/java/com/xxl/job/admin/controller/JobInfoController.java of the component Jobs Handler. Performing manipulation of the argument ID results in improper control of resource identifiers. Remote exploitation of the attack is possible. The exploit has been made public and could be used." }, { "lang": "de", "value": "In Xuxueli xxl-job bis 3.1.1 wurde eine Schwachstelle gefunden. Es geht um die Funktion remove der Datei /src/main/java/com/xxl/job/admin/controller/JobInfoController.java der Komponente Jobs Handler. Durch Beeinflussen des Arguments ID mit unbekannten Daten kann eine improper control of resource identifiers-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5.5, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-99", "description": "Improper Control of Resource Identifiers", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-20T23:32:06.406Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-320806 | Xuxueli xxl-job Jobs JobInfoController.java remove resource injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.320806" }, { "name": "VDB-320806 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.320806" }, { "name": "Submit #631728 | xuxueli xxl-job \u2264 3.1.1 IDOR", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.631728" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3773" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3773#issue-3308389841" } ], "timeline": [ { "lang": "en", "time": "2025-08-20T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-08-20T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-08-20T16:22:33.000Z", "value": "VulDB entry last update" } ], "title": "Xuxueli xxl-job Jobs JobInfoController.java remove resource injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-9264", "datePublished": "2025-08-20T23:32:06.406Z", "dateReserved": "2025-08-20T14:17:23.174Z", "dateUpdated": "2025-08-21T14:47:12.747Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-9619 (GCVE-0-2025-9619)
Vulnerability from cvelistv5
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RC:C
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RC:C
- CWE-99 - Improper Control of Resource Identifiers
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.321790 | vdb-entry | |
https://vuldb.com/?ctiid.321790 | signature, permissions-required | |
https://vuldb.com/?submit.636623 | third-party-advisory |
Vendor | Product | Version | ||
---|---|---|---|---|
E4 Sistemas | Mercatus ERP |
Version: 2.00.019 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-9619", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-29T16:24:19.728165Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-29T16:24:40.171Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Mercatus ERP", "vendor": "E4 Sistemas", "versions": [ { "status": "affected", "version": "2.00.019" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "cadeolog (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A security flaw has been discovered in E4 Sistemas Mercatus ERP 2.00.019. The affected element is an unknown function of the file /basico/webservice/imprimir-danfe/id/. Performing manipulation results in improper control of resource identifiers. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "In E4 Sistemas Mercatus ERP 2.00.019 wurde eine Schwachstelle gefunden. Hierbei betrifft es unbekannten Programmcode der Datei /basico/webservice/imprimir-danfe/id/. Dank der Manipulation mit unbekannten Daten kann eine improper control of resource identifiers-Schwachstelle ausgenutzt werden. Der Angriff l\u00e4sst sich \u00fcber das Netzwerk starten." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:X/RC:C", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:X/RC:C", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:ND/RC:C", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-99", "description": "Improper Control of Resource Identifiers", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-29T04:02:06.330Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-321790 | E4 Sistemas Mercatus ERP id resource injection", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.321790" }, { "name": "VDB-321790 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.321790" }, { "name": "Submit #636623 | e4sistemas Mercatus ERP v 2.00.019 Insecure Direct Object Reference (IDOR)", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.636623" } ], "timeline": [ { "lang": "en", "time": "2025-08-28T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-08-28T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-08-28T20:46:29.000Z", "value": "VulDB entry last update" } ], "title": "E4 Sistemas Mercatus ERP id resource injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-9619", "datePublished": "2025-08-29T04:02:06.330Z", "dateReserved": "2025-08-28T18:41:26.269Z", "dateUpdated": "2025-08-29T16:24:40.171Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation ID: MIT-5
Phase: Implementation
Strategy: Input Validation
Description:
- Assume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.
- When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, "boat" may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as "red" or "blue."
- Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code's environment changes. This can give attackers enough room to bypass the intended validation. However, it can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.
CAPEC-10: Buffer Overflow via Environment Variables
This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the adversary finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
CAPEC-240: Resource Injection
An adversary exploits weaknesses in input validation by manipulating resource identifiers enabling the unintended modification or specification of a resource.
CAPEC-75: Manipulating Writeable Configuration Files
Generally these are manually edited files that are not in the preview of the system administrators, any ability on the attackers' behalf to modify these files, for example in a CVS repository, gives unauthorized access directly to the application, the same as authorized users.