Skip to main content

CVE-2024-0490: CWE-200 Information Disclosure in Huaxia ERP

Medium
VulnerabilityCVE-2024-0490cvecve-2024-0490cwe-200
Published: Sat Jan 13 2024 (01/13/2024, 14:00:05 UTC)
Source: CVE Database V5
Vendor/Project: Huaxia
Product: ERP

Description

A vulnerability was found in Huaxia ERP up to 3.1. It has been rated as problematic. This issue affects some unknown processing of the file /user/getAllList. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-250595.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:56:46 UTC

Technical Analysis

CVE-2024-0490 is a medium-severity information disclosure vulnerability affecting Huaxia ERP versions up to 3.1. The vulnerability is classified under CWE-200, which pertains to unintended information exposure. Specifically, the flaw exists in the processing of the endpoint /user/getAllList, where improper handling allows an unauthenticated remote attacker to retrieve sensitive information without authorization. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network with low attack complexity. The disclosed information could include user lists or other sensitive data managed by the ERP system, potentially aiding attackers in further reconnaissance or targeted attacks. The vendor has addressed this issue in version 3.2, and upgrading to this version mitigates the vulnerability. Although no public exploits have been confirmed in the wild yet, the exploit details have been publicly disclosed, increasing the risk of exploitation by opportunistic attackers. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the confidentiality impact without affecting integrity or availability.

Potential Impact

For European organizations using Huaxia ERP, this vulnerability poses a risk of unauthorized disclosure of sensitive user or business data. Such information leakage can facilitate further attacks such as social engineering, privilege escalation, or targeted intrusion campaigns. The impact is particularly significant for organizations handling critical business operations, personal data under GDPR, or intellectual property. Disclosure of user lists or internal data could lead to reputational damage, regulatory fines, and loss of customer trust. Since the attack vector is remote and requires no authentication, organizations with exposed ERP interfaces are at heightened risk. The vulnerability does not directly impact system integrity or availability but compromises confidentiality, which is a critical security pillar for enterprise resource planning systems.

Mitigation Recommendations

European organizations should prioritize upgrading Huaxia ERP installations to version 3.2 or later to remediate this vulnerability. Until upgrades are applied, organizations should restrict external access to the /user/getAllList endpoint using network-level controls such as firewalls or VPNs. Implementing strict access control policies and monitoring access logs for unusual requests targeting this endpoint can help detect exploitation attempts. Additionally, organizations should conduct regular security assessments and penetration tests focusing on ERP systems to identify similar weaknesses. Employing web application firewalls (WAFs) with custom rules to block suspicious requests to the affected endpoint can provide temporary protection. Finally, ensure that sensitive data exposure is minimized by reviewing ERP configurations and applying the principle of least privilege for data access within the system.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-12T11:58:14.013Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e6699

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/4/2025, 2:56:46 PM

Last updated: 8/12/2025, 2:47:28 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats