cve/2024/CVE-2024-9925.md
2025-09-29 21:09:30 +02:00

18 lines
873 B
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-9925](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9925)
![](https://img.shields.io/static/v1?label=Product&message=QPLANT%20SF&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brightgreen)
### Description
SQL injection vulnerability in TAI Smart Factory's QPLANT SF version 1.0. Exploitation of this vulnerability could allow a remote attacker to retrieve all database information by sending a specially crafted SQL query to the email parameter on the RequestPasswordChange endpoint.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds