Invision Community before 4.7.16 allow SQL injection via the applications/nexus/modules/front/store/store.php IPS\nexus\modules\front\store\_store::_categoryView() method, where user input passed through the filter request parameter is not properly sanitized before being used to execute SQL queries. This can be exploited by unauthenticated attackers to carry out Blind SQL Injection attacks.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2024/Apr/20 | Exploit Mailing List Third Party Advisory |
https://invisioncommunity.com/release-notes/4716-r128/ | Release Notes |
Configurations
History
08 Aug 2024, 21:25
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
CPE | cpe:2.3:a:invisioncommunity:invisioncommunity:*:*:*:*:*:*:*:* | |
Summary |
|
|
First Time |
Invisioncommunity
Invisioncommunity invisioncommunity |
|
References | () http://seclists.org/fulldisclosure/2024/Apr/20 - Exploit, Mailing List, Third Party Advisory | |
References | () https://invisioncommunity.com/release-notes/4716-r128/ - Release Notes | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
07 Jun 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-07 17:15
Updated : 2024-08-08 21:25
NVD link : CVE-2024-30163
Mitre link : CVE-2024-30163
CVE.ORG link : CVE-2024-30163
JSON object : View
Products Affected
invisioncommunity
- invisioncommunity
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')