{"uuid": "a55f74e6-7a7f-421a-88b4-7dfe8f4e4dcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1198", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15418", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1198\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in openBI up to 6.0.3. Affected is the function addxinzhi of the file application/controllers/User.php of the component Phar Handler. The manipulation of the argument outimgurl leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252696.\n\ud83d\udccf Published: 2024-02-02T23:31:04.113Z\n\ud83d\udccf Modified: 2025-05-07T20:07:25.662Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.252696\n2. https://vuldb.com/?ctiid.252696\n3. https://note.zhaoj.in/share/qFXZZfp1NLa3", "creation_timestamp": "2025-05-07T20:23:00.000000Z"}