Executive Summary

Informations
Name CVE-2024-31212 First vendor Publication 2024-04-04
Vendor Cve Last vendor Modification 2024-04-05

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

InstantCMS is a free and open source content management system. A SQL injection vulnerability affects instantcms v2.16.2 in which an attacker with administrative privileges can cause the application to execute unauthorized SQL code. The vulnerability exists in index_chart_data action, which receives an input from user and passes it unsanitized to the core model `filterFunc` function that further embeds this data in an SQL statement. This allows attackers to inject unwanted SQL code into the statement. The `period` should be escaped before inserting it in the query. As of time of publication, a patched version is not available.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31212

Sources (Detail)

https://github.com/instantsoft/icms2/blob/4691a1524780e74107f6009b48d91e17a81...
https://github.com/instantsoft/icms2/blob/4691a1524780e74107f6009b48d91e17a81...
https://github.com/instantsoft/icms2/security/advisories/GHSA-qx95-w566-73fw
https://user-images.githubusercontent.com/109034767/300806111-a33d9548-d99f-4...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-04-05 17:27:23
  • Multiple Updates
2024-04-05 05:27:27
  • First insertion