Description
An SQL Injection vulnerability has been found on Jorani version 1.0.0. This vulnerability allows an authenticated remote user, with low privileges, to send queries with malicious SQL code on the "/leaves/validate" path and the “id” parameter, managing to extract arbritary information from the database.
No analysis available yet.
Remediation
Vendor Solution
This vulnerability has been solved in the 1.0.2 version, released on May 1th.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34145 | An SQL Injection vulnerability has been found on Jorani version 1.0.0. This vulnerability allows an authenticated remote user, with low privileges, to send queries with malicious SQL code on the "/leaves/validate" path and the “id” parameter, managing to extract arbritary information from the database. |
References
History
Thu, 19 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-09-19T19:53:17.252Z
Reserved: 2023-05-12T10:44:03.340Z
Link: CVE-2023-2681
Updated: 2024-08-02T06:33:04.208Z
Status : Modified
Published: 2023-10-03T13:15:09.937
Modified: 2024-11-21T07:59:04.433
Link: CVE-2023-2681
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD