cve/2024/CVE-2024-26264.md

18 lines
872 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-26264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26264)
![](https://img.shields.io/static/v1?label=Product&message=RISWEB%20&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.x%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen)
### Description
EBM Technologies RISWEB's specific query function parameter does not properly restrict user input, and this feature page is accessible without login. This allows remote attackers to inject SQL commands without authentication, enabling them to read, modify, and delete database records.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds