CVE-2024-8331

A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been classified as critical. This affects an unknown part of the file /admin/user/user-move-run.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openrapid:rapidcms:*:*:*:*:*:*:*:*

History

03 Sep 2024, 14:25

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 9.8
References () https://gitee.com/A0kooo/cve_article/blob/master/RapidCMS/SQL%20injection1/rapidcms%20user-move-run.php%20SQL%20injection.md - () https://gitee.com/A0kooo/cve_article/blob/master/RapidCMS/SQL%20injection1/rapidcms%20user-move-run.php%20SQL%20injection.md - Exploit
References () https://vuldb.com/?ctiid.276207 - () https://vuldb.com/?ctiid.276207 - Permissions Required
References () https://vuldb.com/?id.276207 - () https://vuldb.com/?id.276207 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?submit.398769 - () https://vuldb.com/?submit.398769 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:openrapid:rapidcms:*:*:*:*:*:*:*:*
Summary
  • (es) Se ha detectado una vulnerabilidad en OpenRapid RapidCMS hasta la versión 1.3.1. Se ha clasificado como crítica. Afecta a una parte desconocida del archivo /admin/user/user-move-run.php. La manipulación del argumento username provoca una inyección SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.
First Time Openrapid
Openrapid rapidcms

30 Aug 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-30 11:15

Updated : 2024-09-03 14:25


NVD link : CVE-2024-8331

Mitre link : CVE-2024-8331

CVE.ORG link : CVE-2024-8331


JSON object : View

Products Affected

openrapid

  • rapidcms
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')