Headline
CVE-2023-36652: CVCN
A SQL Injection in the users searching REST API endpoint in ProLion CryptoSpike 3.0.15P2 allows remote authenticated attackers to read database data via SQL commands injected in the search parameter.
- Home
- Dettaglio CVE-2023-36652
CVE-2023-36652
Description
A SQL Injection in the users searching REST API endpoint in ProLion CryptoSpike 3.0.15P2 allows remote authenticated attackers to read database data via SQL commands injected in the search parameter.
CVE Link****CVSS v3.1****Details
Introduction
The “search” parameter of the “/audit/users” REST API endpoint is vulnerable to SQL Injection attacks. Through this vulnerability it is possible to access, in read-only mode, to an auxiliary database (not the main system database) used by the system, allowing to access details related to the underlying software infrastructure.
Steps to reproduce
The API endpoint “/audit/users” of the application service "Auditing", which can be invoked by any authenticated user, is vulnerable to SQL Injection via the “search” parameter. It is possible to access the underlying database in read-only mode (via “mySQL” dialect) using the SQL INJECTION “UNION” technique.
The SQL query must be URL encoded accordingly: