First published: Wed Feb 07 2024(Updated: )
A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass in crafted offset, limit, and sort parameters to perform SQL injection via /system/roleDataPerm/list
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
xxyopen Novel | <=4.2.0 | |
xxyopen Novel | =4.3.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24019 is classified as a high severity SQL injection vulnerability.
To fix CVE-2024-24019, upgrade to Novel-Plus version 4.3.0-RC2 or later.
Exploiting CVE-2024-24019 can allow attackers to execute arbitrary SQL queries, leading to data leakage or manipulation.
CVE-2024-24019 affects Novel-Plus versions 4.3.0-RC1 and all prior versions.
SQL injection in CVE-2024-24019 can occur through crafted offset, limit, and sort parameters sent to the /system/roleDataPerm/list endpoint.