2024-10-14 16:03:25 +00:00
|
|
|
{
|
|
|
|
"id": "CVE-2024-48259",
|
|
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
|
|
"published": "2024-10-14T15:15:14.033",
|
2024-10-15 14:03:18 +00:00
|
|
|
"lastModified": "2024-10-15T12:57:46.880",
|
|
|
|
"vulnStatus": "Awaiting Analysis",
|
2024-10-14 16:03:25 +00:00
|
|
|
"cveTags": [],
|
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "Cloudlog 2.6.15 allows Oqrs.php request_form SQL injection via station_id or callsign."
|
2024-10-15 14:03:18 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"lang": "es",
|
|
|
|
"value": "Cloudlog 2.6.15 permite la inyecci\u00f3n SQL de request_form Oqrs.php a trav\u00e9s de station_id o callsign."
|
2024-10-14 16:03:25 +00:00
|
|
|
}
|
|
|
|
],
|
|
|
|
"metrics": {},
|
|
|
|
"references": [
|
|
|
|
{
|
|
|
|
"url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in-9a3",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://github.com/magicbug/Cloudlog",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://www.magicbug.co.uk/cloudlog/",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|