Invision Community before 4.7.16 allow SQL injection via the applications/nexus/modules/front/store/store.php IPS\nexus\modules\front\store\_store::_categoryView() method, where user input passed through the filter request parameter is not properly sanitized before being used to execute SQL queries. This can be exploited by unauthenticated attackers to carry out Blind SQL Injection attacks.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2024/Apr/20 | Exploit Mailing List Third Party Advisory |
https://invisioncommunity.com/release-notes/4716-r128/ | Release Notes |
http://seclists.org/fulldisclosure/2024/Apr/20 | Exploit Mailing List Third Party Advisory |
https://invisioncommunity.com/release-notes/4716-r128/ | Release Notes |
Configurations
History
21 Nov 2024, 09:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Apr/20 - Exploit, Mailing List, Third Party Advisory | |
References | () https://invisioncommunity.com/release-notes/4716-r128/ - Release Notes |
08 Aug 2024, 21:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:invisioncommunity:invisioncommunity:*:*:*:*:*:*:*:* | |
Summary |
|
|
CWE | CWE-89 | |
References | () http://seclists.org/fulldisclosure/2024/Apr/20 - Exploit, Mailing List, Third Party Advisory | |
References | () https://invisioncommunity.com/release-notes/4716-r128/ - Release Notes | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Invisioncommunity
Invisioncommunity invisioncommunity |
07 Jun 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-07 17:15
Updated : 2024-11-21 09:11
NVD link : CVE-2024-30163
Mitre link : CVE-2024-30163
CVE.ORG link : CVE-2024-30163
JSON object : View
Products Affected
invisioncommunity
- invisioncommunity
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')