A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.
References
Link Resource
https://github.com/i900008/vulndb/blob/main/kylin-activation_vuln.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.222260 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.222260 Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: VulDB

Published: 2023-03-03T06:56:06.175Z

Updated: 2024-02-13T07:52:30.361Z

Reserved: 2023-03-03T06:54:45.992Z


Link: CVE-2023-1164

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-03-03T07:15:09.370

Modified: 2024-05-17T02:17:51.757


Link: CVE-2023-1164

JSON object: View

cve-icon Redhat Information

No data.