Description
FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Affected Software
{"id": "CVE-2020-24791", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2020-24791", "description": "FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.", "published": "2021-03-10T14:15:00", "modified": "2021-03-12T19:53:00", "epss": [{"cve": "CVE-2020-24791", "epss": 0.17199, "percentile": 0.9529, "modified": "2023-06-06"}], "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5}, "severity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24791", "reporter": "cve@mitre.org", "references": ["https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt", "https://github.com/daylightstudio/FUEL-CMS/issues/561", "https://www.exploit-db.com/exploits/48778"], "cvelist": ["CVE-2020-24791"], "immutableFields": [], "lastseen": "2023-06-06T14:37:41", "viewCount": 13, "enchantments": {"dependencies": {"references": []}, "score": {"value": 4.7, "vector": "NONE"}, "twitter": {"counter": 4, "modified": "2021-03-11T14:30:25", "tweets": [{"link": "https://twitter.com/threatintelctr/status/1370466823917989888", "text": " NEW: CVE-2020-24791 FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data... (click for more) Severity: CRITICAL https://t.co/Ei7IUGGefR?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1370466823917989888", "text": " NEW: CVE-2020-24791 FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data... (click for more) Severity: CRITICAL https://t.co/Ei7IUGGefR?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1370474362961227779", "text": " NEW: CVE-2020-24791 FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data... (click for more) Severity: CRITICAL https://t.co/Ei7IUGoCRh?amp=1"}, {"link": "https://twitter.com/threatintelctr/status/1370474362961227779", "text": " NEW: CVE-2020-24791 FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data... (click for more) Severity: CRITICAL https://t.co/Ei7IUGoCRh?amp=1"}]}, "backreferences": {}, "exploitation": null, "affected_software": {"major_version": [{"name": "thedaylightstudio fuel cms", "version": 1}]}, "epss": [{"cve": "CVE-2020-24791", "epss": 0.12918, "percentile": 0.94633, "modified": "2023-05-07"}], "vulnersScore": 4.7}, "_state": {"dependencies": 1686073041, "score": 1686062979, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "9aa98c0836c67761ff8ecd68da85811d"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:thedaylightstudio:fuel_cms:1.4.8"], "cpe23": ["cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.8:*:*:*:*:*:*:*"], "cwe": ["CWE-89"], "affectedSoftware": [{"cpeName": "thedaylightstudio:fuel_cms", "version": "1.4.8", "operator": "eq", "name": "thedaylightstudio fuel cms"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.8:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt", "name": "https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/daylightstudio/FUEL-CMS/issues/561", "name": "https://github.com/daylightstudio/FUEL-CMS/issues/561", "refsource": "MISC", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"]}, {"url": "https://www.exploit-db.com/exploits/48778", "name": "https://www.exploit-db.com/exploits/48778", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"]}], "product_info": [{"vendor": "Thedaylightstudio", "product": "Fuel_cms"}], "solutions": [], "workarounds": [], "impacts": [], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "exploits": [], "assigned": "1976-01-01T00:00:00"}
{}