Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-24572
HistoryJan 31, 2024 - 10:33 p.m.

CVE-2024-24572 facileManager Authenticated Variable Manipulation leading to SQL Injection

2024-01-3122:33:08
CWE-89
GitHub_M
www.cve.org
4
cve-2024-24572
sql injection
facilemanager
variable manipulation
authenticated user
sysadmin
web apps
version 4.5.0
extract function
admin-logs.php
fm-init.php
$_session manipulation
sensitive variables
site logs

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

19.4%

facileManager is a modular suite of web apps built with the sysadmin in mind. In versions 4.5.0 and earlier, the $_REQUEST global array was unsafely called inside an extract() function in admin-logs.php. The PHP file fm-init.php prevents arbitrary manipulation of $_SESSION via the GET/POST parameters. However, it does not prevent manipulation of any other sensitive variables such as $search_sql. Knowing this, an authenticated user with privileges to view site logs can manipulate the search_sql
variable by appending a GET parameter search_sql in the URL. The information above means that the checks and SQL injection prevention attempts were rendered unusable.

CNA Affected

[
  {
    "vendor": "WillyXJ",
    "product": "facileManager",
    "versions": [
      {
        "version": "<= 4.5.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

19.4%

Related for CVELIST:CVE-2024-24572