Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-46954: GitHub - jakedmurphy1/CVE-2023-46954

SQL Injection vulnerability in Relativity ODA LLC RelativityOne v.12.1.537.3 Patch 2 and earlier allows a remote attacker to execute arbitrary code via the name parameter.

CVE
#sql#vulnerability#js#git

SQL Injection vulnerability in Relativity ODA LLC RelativityOne v.12.1.537.3 Patch 2 and earlier allows a remote attacker to execute arbitrary code via the name parameter.

[Vulnerability Type] SQL Injection

[Vendor of Product] Relativity ODA LLC

[Affected Product Code Base] RelativityOne - 12.1.537.3 Patch 2 and earlier

[Affected Component] POST /Relativity.Rest/API/Relativity.Users/workspace//users/retrieveusersby

[Attack Type] Remote

[Impact Code execution] true

[Attack Vectors] Within the JSON POST parameter 'Name’, the following payload will return true and display a list of names and emails:

(SELECT (CASE WHEN (1=1) THEN 03586 ELSE 3*(SELECT 2 UNION ALL SELECT 1) END))

But the following payload will return false and display the message 'SQL Statement Failed’:

(SELECT (CASE WHEN (1=2) THEN 03586 ELSE 3*(SELECT 2 UNION ALL SELECT 1) END))

Note: the True/False comparison takes place within the CASE WHEN () clause.

[Reference] https://www.linkedin.com/in/jakedmurphy1/

[Has vendor confirmed or acknowledged the vulnerability?] true

[Discoverer] Jake Murphy

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907