Lucene search

K
githubGitHub Advisory DatabaseGHSA-287F-46J7-J4WH
HistoryApr 24, 2024 - 5:04 p.m.

Umbraco Workflow's Backoffice users can execute arbitrary SQL

2024-04-2417:04:34
CWE-89
GitHub Advisory Database
github.com
5
umbraco workflow
backoffice users
sql execution
api endpoint
security vulnerability
patch
upgrading

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N

8.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

Impact

Backoffice users can execute arbitrary SQL.

Explanation of the vulnerability

A Backoffice user can modify requests to a particular API endpoint to include SQL which will be executed by the server.

Affected versions

All versions

Patches

Workflow 10.3.9, 12.2.6, 13.0.6, Plumber 10.1.2

References

Upgrading Umbraco Workflow

Affected configurations

Vulners
Node
github_advisory_databaseplumber.workflowRange<10.1.2
OR
github_advisory_databaseumbraco.workflowRange<13.0.6
OR
github_advisory_databaseumbraco.workflowRange11.0.0-rc1
OR
github_advisory_databaseumbraco.workflowRange<12.2.6
OR
github_advisory_databaseumbraco.workflowRange<10.3.9

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N

8.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

Related for GHSA-287F-46J7-J4WH