Critical Vulnerability in ContiNew Admin 3.2.0 Allow for Remote SQL Injection
CVE-2024-8155
4.9MEDIUM
Key Information
- Vendor
- Continew
- Status
- Admin
- Vendor
- CVE Published:
- 25 August 2024
Summary
A vulnerability classified as critical was found in ContiNew Admin 3.2.0. Affected by this vulnerability is the function top.continew.starter.extension.crud.controller.BaseController#tree of the file /api/system/dept/tree?sort=parentId%2Casc&sort=sort%2Casc. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Affected Version(s)
Admin = 3.2.0
CVSS V3.1
Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Risk change from: null to: 4.7 - (MEDIUM)
VulDB entry last update
VulDB entry created
Advisory disclosed
Vulnerability published.
Collectors
NVD DatabaseMitre Database
Credit
Chiexf (VulDB User)
Chiexf (VulDB User)