CVE-2023-1164

A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.
References
Link Resource
https://github.com/i900008/vulndb/blob/main/kylin-activation_vuln.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.222260 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.222260 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:kylinos:kylin_os:*:*:*:*:desktop:*:*:*
cpe:2.3:o:kylinos:kylin_os:*:*:*:*:server:*:*:*

History

21 Oct 2023, 08:15

Type Values Removed Values Added
Summary A vulnerability was found in KylinSoft kylin-activation and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260. A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.

10 Mar 2023, 19:03

Type Values Removed Values Added
First Time Kylinos
Kylinos kylin Os
CPE cpe:2.3:o:kylinos:kylin_os:*:*:*:*:server:*:*:*
cpe:2.3:o:kylinos:kylin_os:*:*:*:*:desktop:*:*:*
CWE CWE-285 CWE-863
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References (MISC) https://github.com/i900008/vulndb/blob/main/kylin-activation_vuln.md - (MISC) https://github.com/i900008/vulndb/blob/main/kylin-activation_vuln.md - Exploit, Third Party Advisory
References (MISC) https://vuldb.com/?id.222260 - (MISC) https://vuldb.com/?id.222260 - Third Party Advisory, VDB Entry
References (MISC) https://vuldb.com/?ctiid.222260 - (MISC) https://vuldb.com/?ctiid.222260 - Permissions Required, Third Party Advisory, VDB Entry

03 Mar 2023, 15:15

Type Values Removed Values Added
Summary A vulnerability was found in kylin-activation and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260. A vulnerability was found in KylinSoft kylin-activation and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.

03 Mar 2023, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-03 07:15

Updated : 2024-04-11 01:17


NVD link : CVE-2023-1164

Mitre link : CVE-2023-1164

CVE.ORG link : CVE-2023-1164


JSON object : View

Products Affected

kylinos

  • kylin_os
CWE
CWE-863

Incorrect Authorization

CWE-285

Improper Authorization