Vulnerability Description
A vulnerability, which was classified as critical, was found in TreasureHuntGame TreasureHunt up to 963e0e0. Affected is an unknown function of the file TreasureHunt/acesso.php. The manipulation of the argument usuario leads to sql injection. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is 8bcc649abc35b7734951be084bb522a532faac4e. It is recommended to apply a patch to fix this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Treasurehuntgame | Treasurehunt | < 2024-05-04 |
Related Weaknesses (CWE)
References
- https://github.com/TreasureHuntGame/TreasureHunt/commit/8bcc649abc35b7734951be08Patch
- https://vuldb.com/?ctiid.289164Permissions RequiredVDB Entry
- https://vuldb.com/?id.289164Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-12894?
CVE-2024-12894 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability, which was classified as critical, was found in TreasureHuntGame TreasureHunt up to 963e0e0. Affected is an unknown function of the file TreasureHunt/acesso.php. The manipulation of th...
How severe is CVE-2024-12894?
CVE-2024-12894 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-12894?
Check the references section above for vendor advisories and patch information. Affected products include: Treasurehuntgame Treasurehunt.