### [CVE-2024-32640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32640) ![](https://img.shields.io/static/v1?label=Product&message=MasaCMS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.2.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%207.3.0%2C%20%3C%207.3.13%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%207.4.0%2C%20%3C%207.4.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brightgreen) ### Description MASA CMS is an Enterprise Content Management platform based on open source technology. Versions prior to 7.4.6, 7.3.13, and 7.2.8 contain a SQL injection vulnerability in the `processAsyncObject` method that can result in remote code execution. Versions 7.4.6, 7.3.13, and 7.2.8 contain a fix for the issue. ### POC #### Reference - https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS - https://projectdiscovery.io/blog/hacking-apple-with-sql-injection?ref=projectdiscovery-io-blog-newsletter #### Github - https://github.com/0day404/HV-2024-POC - https://github.com/0x3f3c/CVE-2024-32640-SQLI-MuraCMS - https://github.com/0xYumeko/CVE-2024-32640-SQLI-MuraCMS - https://github.com/12442RF/POC - https://github.com/ARPSyndicate/cve-scores - https://github.com/AboSteam/POPC - https://github.com/DMW11525708/wiki - https://github.com/IIDavi/WordPress-Mura-CMS-Checker - https://github.com/Lern0n/Lernon-POC - https://github.com/Linxloop/fork_POC - https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS - https://github.com/Threekiii/CVE - https://github.com/Warren-Jace/poc-doc - https://github.com/WhosGa/MyWiki - https://github.com/Yuan08o/pocs - https://github.com/admin772/POC - https://github.com/adminlove520/pocWiki - https://github.com/adysec/POC - https://github.com/cisp-pte/POC-20241008-sec-fork - https://github.com/eeeeeeeeee-code/POC - https://github.com/enomothem/PenTestNote - https://github.com/greenberglinken/2023hvv_1 - https://github.com/iemotion/POC - https://github.com/int3x/ctf-writeups - https://github.com/laoa1573/wy876 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/oLy0/Vulnerability - https://github.com/pizza-power/CVE-2024-32640 - https://github.com/sammings/CVE-2024-32640 - https://github.com/tanjiti/sec_profile - https://github.com/wjlin0/poc-doc - https://github.com/wooluo/POC00 - https://github.com/wy876/POC - https://github.com/wy876/wiki