cve/2024/CVE-2024-31212.md
2024-06-09 00:33:16 +00:00

20 lines
1.4 KiB
Markdown

### [CVE-2024-31212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31212)
![](https://img.shields.io/static/v1?label=Product&message=icms2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3D%202.16.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen)
### Description
InstantCMS is a free and open source content management system. A SQL injection vulnerability affects instantcms v2.16.2 in which an attacker with administrative privileges can cause the application to execute unauthorized SQL code. The vulnerability exists in index_chart_data action, which receives an input from user and passes it unsanitized to the core model `filterFunc` function that further embeds this data in an SQL statement. This allows attackers to inject unwanted SQL code into the statement. The `period` should be escaped before inserting it in the query. As of time of publication, a patched version is not available.
### POC
#### Reference
- https://github.com/instantsoft/icms2/security/advisories/GHSA-qx95-w566-73fw
- https://github.com/instantsoft/icms2/security/advisories/GHSA-qx95-w566-73fw
#### Github
No PoCs found on GitHub currently.