First published: Wed Mar 08 2023(Updated: )
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/list.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Funadmin | =3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-24773 is classified as high due to its potential to allow unauthorized access to the database.
To fix CVE-2023-24773, update Funadmin to the latest version that has patched this SQL injection vulnerability.
CVE-2023-24773 specifically affects the id parameter at /databases/database/list in Funadmin v3.2.0.
Yes, CVE-2023-24773 can be exploited remotely if the affected software is accessible over the internet.
CVE-2023-24773 can enable attackers to execute arbitrary SQL queries, potentially leading to data exfiltration or loss.