Blind Boolean-Based SQL Injection Vulnerability in Avesko's Template_io.php File
CVE-2024-50584
4.4MEDIUM
Key Information:
- Vendor
Image Access Gmbh
- Status
- Vendor
- CVE Published:
- 12 December 2024
Badges
👾 Exploit Exists
What is CVE-2024-50584?
An authenticated attacker with the user/role "Poweruser" can perform an SQL injection by accessing the /class/template_io.php file and supplying malicious GET parameters. The "templates" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter.
Affected Version(s)
Scan2Net 0
References
CVSS V3.1
Score:
4.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Daniel Hirschberger (SEC Consult Vulnerability Lab)
Tobias Niemann (SEC Consult Vulnerability Lab)
