Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-36652: CVCN

A SQL Injection in the users searching REST API endpoint in ProLion CryptoSpike 3.0.15P2 allows remote authenticated attackers to read database data via SQL commands injected in the search parameter.

CVE
#sql#vulnerability#auth
  1. Home
  2. Dettaglio CVE-2023-36652

CVE-2023-36652

Description

A SQL Injection in the users searching REST API endpoint in ProLion CryptoSpike 3.0.15P2 allows remote authenticated attackers to read database data via SQL commands injected in the search parameter.

CVE Link****CVSS v3.1****Details

Introduction

The “search” parameter of the “/audit/users” REST API endpoint is vulnerable to SQL Injection attacks. Through this vulnerability it is possible to access, in read-only mode, to an auxiliary database (not the main system database) used by the system, allowing to access details related to the underlying software infrastructure.

Steps to reproduce

The API endpoint “/audit/users” of the application service "Auditing", which can be invoked by any authenticated user, is vulnerable to SQL Injection via the “search” parameter. It is possible to access the underlying database in read-only mode (via “mySQL” dialect) using the SQL INJECTION “UNION” technique.

The SQL query must be URL encoded accordingly:

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907