Impact
A vulnerability in the MRI feedback popup of the LORIS web application allows attackers to inject arbitrary SQL statements, enabling them to read or modify stored data. This flaw could lead to unauthorized disclosure of sensitive research information or destructive changes to the database, thereby violating confidentiality and integrity of the system.
Affected Systems
The flaw affects the LORIS application from the aces project for all releases prior to 27.0.3 and 28.0.1 – that is, LORIS versions 27.0.2 and earlier, and 28.0.0. These versions are still in use by some neuroimaging research groups.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, yet the exploit probability score is not disclosed. The flaw can be triggered through the web interface by submitting crafted input to the MRI feedback popup, so the attack vector is remote over the network. No special conditions beyond access to the application are required, making the vulnerability relatively easy to exploit for users who can reach the LORIS server.
OpenCVE Enrichment