CVE-2024-32493

An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in agent is able to inject SQL in the draft form ID parameter of an AJAX request.
SQL Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CISA-ADPADP
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 46%
Debian logo
Debian Releases
Debian Product
Codename
znuny
bookworm/non-free
vulnerable
trixie/non-free
6.5.15-2
fixed
sid/non-free
6.5.15-2
fixed
bookworm
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
znuny
plucky
not-affected
oracular
not-affected
noble
needs-triage
mantic
ignored
jammy
dne
focal
dne