Lucene search

K
cve[email protected]CVE-2024-37896
HistoryJun 17, 2024 - 8:15 p.m.

CVE-2024-37896

2024-06-1720:15:14
CWE-89
web.nvd.nist.gov
21
gin-vue-admin
sql injection
data leakage
database compromise
upgrade

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.6.5 has SQL injection vulnerability. The SQL injection vulnerabilities occur when a web application allows users to input data into SQL queries without sufficiently validating or sanitizing the input. Failing to properly enforce restrictions on user input could mean that even a basic form input field can be used to inject arbitrary and potentially dangerous SQL commands. This could lead to unauthorized access to the database, data leakage, data manipulation, or even complete compromise of the database server. This vulnerability has been addressed in commit 53d033821 which has been included in release version 2.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Vulners
Node
flipped-auroragin_vue_adminRange<2.6.6

CNA Affected

[
  {
    "vendor": "flipped-aurora",
    "product": "gin-vue-admin",
    "versions": [
      {
        "version": "< 2.6.6",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2024-37896