{ "id": "CVE-2024-48509", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T20:15:14.943", "lastModified": "2025-01-23T16:50:03.787", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Learning with Texts (LWT) 2.0.3 is vulnerable to SQL Injection. This occurs when the application fails to properly sanitize user inputs, allowing attackers to manipulate SQL queries by injecting malicious SQL statements into URL parameters. By exploiting this vulnerability, an attacker could gain unauthorized access to the database, retrieve sensitive information, modify or delete data, and execute arbitrary commands." }, { "lang": "es", "value": "Learning with Texts (LWT) 2.0.3 es vulnerable a la inyecci\u00f3n SQL. Esto ocurre cuando la aplicaci\u00f3n no logra depurar correctamente las entradas del usuario, lo que permite a los atacantes manipular las consultas SQL inyectando instrucciones SQL maliciosas en los par\u00e1metros de la URL. Al explotar esta vulnerabilidad, un atacante podr\u00eda obtener acceso no autorizado a la base de datos, recuperar informaci\u00f3n confidencial, modificar o eliminar datos y ejecutar comandos arbitrarios." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-89" } ] }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-89" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:lang-learn-guy:learning_with_texts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C21149A-45A1-49B6-AB7D-6E30407C3D22" } ] } ] } ], "references": [ { "url": "https://medium.com/%40ChadSecurity/the-cve-2024-48509-vulnerability-overview-df58a6be6864", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] } ] }