First published: Fri Jun 23 2023(Updated: )
An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameter date_from, date_to, and id_product allows a remote attacker to bypass a web application's authentication and authorization mechanisms and retrieve the contents of an entire database.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webkul QloApps | =1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36284 is an unauthenticated Time-Based SQL injection vulnerability found in Webkul QloApps 1.6.0.
CVE-2023-36284 allows a remote attacker to bypass authentication and authorization mechanisms by exploiting the Time-Based SQL injection vulnerability in the date_from, date_to, and id_product GET parameters.
CVE-2023-36284 has a severity rating of 7.5 (high).
To fix CVE-2023-36284, it is recommended to update Webkul QloApps to a version that has addressed the vulnerability.
You can find more information about CVE-2023-36284 in the following reference: [link](https://flashy-lemonade-192.notion.site/Time-Based-SQL-injection-in-QloApps-1-6-0-0-be3ed1bdaf784a77b45dc6898a2de17e?pvs=4)