CVE-2024-8395

FlyCASS CASS and KCM systems did not correctly filter SQL queries, which made them vulnerable to attack by outside attackers with no authentication.
References
Link Resource
https://ian.sh/tsa Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:flycass:flycass:-:*:*:*:*:*:*:*

History

19 Sep 2024, 17:53

Type Values Removed Values Added
CPE cpe:2.3:a:flycass:flycass:-:*:*:*:*:*:*:*
First Time Flycass flycass
Flycass
References () https://ian.sh/tsa - () https://ian.sh/tsa - Exploit, Third Party Advisory

06 Sep 2024, 12:08

Type Values Removed Values Added
Summary
  • (es) Los sistemas CASS y KCM de FlyCASS no filtraron correctamente las consultas SQL, lo que los hizo vulnerables a ataques de atacantes externos sin autenticación.

05 Sep 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-05 20:15

Updated : 2024-09-19 17:53


NVD link : CVE-2024-8395

Mitre link : CVE-2024-8395

CVE.ORG link : CVE-2024-8395


JSON object : View

Products Affected

flycass

  • flycass
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')