CVE-2024-32493

EUVD-2024-30296
An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in agent is able to inject SQL in the draft form ID parameter of an AJAX request.
SQL Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 69%
Affected Products (NVD)
VendorProductVersion
znunyznuny
6.5.1 ≤
𝑥
≤ 6.5.7
znunyznuny
7.0.1 ≤
𝑥
≤ 7.0.16
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
znuny
bookworm
no-dsa
bookworm/non-free
vulnerable
forky/non-free
6.5.18-1
fixed
sid/non-free
6.5.18-1
fixed
trixie/non-free
6.5.15-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
znuny
focal
dne
jammy
dne
mantic
ignored
noble
needs-triage
oracular
not-affected
plucky
not-affected
questing
not-affected