Vulnerability Description
SQL injection vulnerability in JEPAAS7.2.8, via /je/rbac/rbac/loadLoginCount in the dateVal parameter, which could allow a remote user to submit a specially crafted query, allowing an attacker to retrieve all the information stored in the DB.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ketr | Jepaas | 7.2.8 |
Related Weaknesses (CWE)
References
- https://abcc111.github.io/posts/CVE-2024-51165/ExploitThird Party Advisory
- https://github.com/abcc111/vulns/blob/main/JEPaaS/SQL%20injection%20vulnerabilitBroken Link
FAQ
What is CVE-2024-51165?
CVE-2024-51165 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in JEPAAS7.2.8, via /je/rbac/rbac/loadLoginCount in the dateVal parameter, which could allow a remote user to submit a specially crafted query, allowing an attacker to retr...
How severe is CVE-2024-51165?
CVE-2024-51165 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-51165?
Check the references section above for vendor advisories and patch information. Affected products include: Ketr Jepaas.