Vulnerability Description
SQL Injection vulnerability in the default configuration of the Logitime WebClock application <= 5.43.0 allows an unauthenticated user to run arbitrary code on the backend database server.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://en.logitime.com/time-attendance/
- https://nl.logitime.com/
- https://nl.logitime.com/download/webclock-v5-43-0-13-12-2024/
- https://tulling.dev/disclosures/cve-2024-55971/
FAQ
What is CVE-2024-55971?
CVE-2024-55971 is a vulnerability with a CVSS score of 10.0 (CRITICAL). SQL Injection vulnerability in the default configuration of the Logitime WebClock application <= 5.43.0 allows an unauthenticated user to run arbitrary code on the backend database server.
How severe is CVE-2024-55971?
CVE-2024-55971 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-55971?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.