{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-0705","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-01-24T09:46:47.642Z","datePublished":"2025-01-24T19:00:18.692Z","dateUpdated":"2025-01-24T19:18:34.266Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-01-24T19:00:18.692Z"},"title":"JoeyBling bootplus QrCodeController.java qrCode redirect","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-601","lang":"en","description":"Open Redirect"}]}],"affected":[{"vendor":"JoeyBling","product":"bootplus","versions":[{"version":"247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d and classified as problematic. Affected by this vulnerability is the function qrCode of the file src/main/java/io/github/controller/QrCodeController.java. The manipulation of the argument text leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available."},{"lang":"de","value":"In JoeyBling bootplus bis 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Dabei geht es um die Funktion qrCode der Datei src/main/java/io/github/controller/QrCodeController.java. Mittels Manipulieren des Arguments text mit unbekannten Daten kann eine open redirect-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Dieses Produkt setzt Rolling Releases ein. Aus diesem Grund sind Details zu betroffenen oder zu aktualisierende Versionen nicht verfügbar."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}}],"timeline":[{"time":"2025-01-24T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-01-24T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-01-24T10:51:53.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LVZC3 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.293233","name":"VDB-293233 | JoeyBling bootplus QrCodeController.java qrCode redirect","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.293233","name":"VDB-293233 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.480844","name":"Submit #480844 | JoeyBling bootplus 1.0 URL redirection","tags":["third-party-advisory"]},{"url":"https://github.com/JoeyBling/bootplus/issues/27","tags":["issue-tracking"]},{"url":"https://github.com/JoeyBling/bootplus/issues/27#issue-2786941847","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-24T19:18:27.266952Z","id":"CVE-2025-0705","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-24T19:18:34.266Z"}}]}}