Vulnerability Description
A vulnerability was found in ContiNew Admin 3.2.0 and classified as critical. Affected by this issue is the function top.continew.starter.extension.crud.controller.BaseController#page of the file /api/system/user?deptId=1&page=1&size=10. The manipulation of the argument sort leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Continew | Continew Admin | 3.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/Chiexf/cve/issues/2ExploitIssue Tracking
- https://vuldb.com/?ctiid.275738Permissions Required
- https://vuldb.com/?id.275738Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.391229Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-8150?
CVE-2024-8150 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A vulnerability was found in ContiNew Admin 3.2.0 and classified as critical. Affected by this issue is the function top.continew.starter.extension.crud.controller.BaseController#page of the file /api...
How severe is CVE-2024-8150?
CVE-2024-8150 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-8150?
Check the references section above for vendor advisories and patch information. Affected products include: Continew Continew Admin.