CVE-2024-13200
Published: 09 January 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2024-13200 is a critical vulnerability involving improper access controls in the wander-chu SpringBoot-Blog version 1.0. It affects the preHandle function within the file src/main/java/com/my/blog/website/interceptor/BaseInterceptor.java, part of the HTTP POST Request Handler component. The issue, linked to CWE-266 and CWE-284, allows manipulation that bypasses access restrictions.
The vulnerability can be exploited remotely by unauthenticated attackers with network access, requiring low complexity and no user interaction, as indicated by its CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Successful exploitation grants low-level impacts on confidentiality, integrity, and availability.
Advisories from sources including VulDB and GitHub issues for the SpringBoot-Blog repository detail the vulnerability and note that the vendor was contacted early regarding disclosure but provided no response. No patches or mitigations are mentioned in the available information.
The exploit has been publicly disclosed and may be actively used, with references available on GitHub and VulDB.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability is an improper access control (permission bypass) in a public-facing SpringBoot-Blog application, allowing remote unauthenticated attackers to send HTTP POST requests that bypass login and modify website content. This enables T1190 (Exploit Public-Facing Application) for initial access and T1068 (Exploitation for Privilege Escalation) as explicitly mapped in the advisory.