CVE-2024-0490: CWE-200 Information Disclosure in Huaxia ERP
A vulnerability was found in Huaxia ERP up to 3.1. It has been rated as problematic. This issue affects some unknown processing of the file /user/getAllList. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-250595.
AI Analysis
Technical Summary
CVE-2024-0490 is a medium-severity information disclosure vulnerability affecting Huaxia ERP versions up to 3.1. The vulnerability is classified under CWE-200, which pertains to unintended information exposure. Specifically, the flaw exists in the processing of the endpoint /user/getAllList, where improper handling allows an unauthenticated remote attacker to retrieve sensitive information without authorization. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network with low attack complexity. The disclosed information could include user lists or other sensitive data managed by the ERP system, potentially aiding attackers in further reconnaissance or targeted attacks. The vendor has addressed this issue in version 3.2, and upgrading to this version mitigates the vulnerability. Although no public exploits have been confirmed in the wild yet, the exploit details have been publicly disclosed, increasing the risk of exploitation by opportunistic attackers. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the confidentiality impact without affecting integrity or availability.
Potential Impact
For European organizations using Huaxia ERP, this vulnerability poses a risk of unauthorized disclosure of sensitive user or business data. Such information leakage can facilitate further attacks such as social engineering, privilege escalation, or targeted intrusion campaigns. The impact is particularly significant for organizations handling critical business operations, personal data under GDPR, or intellectual property. Disclosure of user lists or internal data could lead to reputational damage, regulatory fines, and loss of customer trust. Since the attack vector is remote and requires no authentication, organizations with exposed ERP interfaces are at heightened risk. The vulnerability does not directly impact system integrity or availability but compromises confidentiality, which is a critical security pillar for enterprise resource planning systems.
Mitigation Recommendations
European organizations should prioritize upgrading Huaxia ERP installations to version 3.2 or later to remediate this vulnerability. Until upgrades are applied, organizations should restrict external access to the /user/getAllList endpoint using network-level controls such as firewalls or VPNs. Implementing strict access control policies and monitoring access logs for unusual requests targeting this endpoint can help detect exploitation attempts. Additionally, organizations should conduct regular security assessments and penetration tests focusing on ERP systems to identify similar weaknesses. Employing web application firewalls (WAFs) with custom rules to block suspicious requests to the affected endpoint can provide temporary protection. Finally, ensure that sensitive data exposure is minimized by reviewing ERP configurations and applying the principle of least privilege for data access within the system.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2024-0490: CWE-200 Information Disclosure in Huaxia ERP
Description
A vulnerability was found in Huaxia ERP up to 3.1. It has been rated as problematic. This issue affects some unknown processing of the file /user/getAllList. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-250595.
AI-Powered Analysis
Technical Analysis
CVE-2024-0490 is a medium-severity information disclosure vulnerability affecting Huaxia ERP versions up to 3.1. The vulnerability is classified under CWE-200, which pertains to unintended information exposure. Specifically, the flaw exists in the processing of the endpoint /user/getAllList, where improper handling allows an unauthenticated remote attacker to retrieve sensitive information without authorization. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network with low attack complexity. The disclosed information could include user lists or other sensitive data managed by the ERP system, potentially aiding attackers in further reconnaissance or targeted attacks. The vendor has addressed this issue in version 3.2, and upgrading to this version mitigates the vulnerability. Although no public exploits have been confirmed in the wild yet, the exploit details have been publicly disclosed, increasing the risk of exploitation by opportunistic attackers. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the confidentiality impact without affecting integrity or availability.
Potential Impact
For European organizations using Huaxia ERP, this vulnerability poses a risk of unauthorized disclosure of sensitive user or business data. Such information leakage can facilitate further attacks such as social engineering, privilege escalation, or targeted intrusion campaigns. The impact is particularly significant for organizations handling critical business operations, personal data under GDPR, or intellectual property. Disclosure of user lists or internal data could lead to reputational damage, regulatory fines, and loss of customer trust. Since the attack vector is remote and requires no authentication, organizations with exposed ERP interfaces are at heightened risk. The vulnerability does not directly impact system integrity or availability but compromises confidentiality, which is a critical security pillar for enterprise resource planning systems.
Mitigation Recommendations
European organizations should prioritize upgrading Huaxia ERP installations to version 3.2 or later to remediate this vulnerability. Until upgrades are applied, organizations should restrict external access to the /user/getAllList endpoint using network-level controls such as firewalls or VPNs. Implementing strict access control policies and monitoring access logs for unusual requests targeting this endpoint can help detect exploitation attempts. Additionally, organizations should conduct regular security assessments and penetration tests focusing on ERP systems to identify similar weaknesses. Employing web application firewalls (WAFs) with custom rules to block suspicious requests to the affected endpoint can provide temporary protection. Finally, ensure that sensitive data exposure is minimized by reviewing ERP configurations and applying the principle of least privilege for data access within the system.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-12T11:58:14.013Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034b182aa0cae27e6699
Added to database: 6/3/2025, 2:14:35 PM
Last enriched: 7/4/2025, 2:56:46 PM
Last updated: 8/12/2025, 2:47:28 AM
Views: 11
Related Threats
CVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.