Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the `report/data/proofofplayReport` API route inside the CMS. This allows an authenticated user to to obtain and modify arbitrary data from the Xibo database by injecting specially crafted values in to the `sortBy` parameter. Users should upgrade to version 3.3.12 or 4.0.14 which fix this issue.
References
Configurations
No configuration.
History
21 Nov 2024, 09:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/xibosignage/xibo-cms/commit/c60cfd8727da77b9db10297148eadd697ebec353.patch - | |
References | () https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-v6q4-h869-gm3r - | |
References | () https://xibosignage.com/blog/security-advisory-2024-07 - |
31 Jul 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-30 17:15
Updated : 2024-11-21 09:33
NVD link : CVE-2024-41944
Mitre link : CVE-2024-41944
CVE.ORG link : CVE-2024-41944
JSON object : View
Products Affected
No product.
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')