CVE-2024-57436: RuoYi allowed unauthorized attackers to view the session ID of the admin in the system monitoring
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.28504%
CWE
Published
1/29/2025
Updated
1/29/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.ruoyi:ruoyi | maven | <= 4.8.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on unauthorized session ID exposure in system monitoring. Analysis of RuoYi's architecture indicates:
- Session management is typically handled through Shiro integration
- The system monitoring feature would require access to session data
- The GHSA description confirms session IDs are visible in monitoring
- Common patterns in Spring Boot applications show session listing functionality in monitor controllers While exact implementation details aren't available, the combination of Shiro session management, monitoring endpoints, and the described vulnerability pattern strongly suggests insecure session data exposure in these components.