THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-40614

Assignermitre
Reserved2024-07-07
Published2024-07-07
Updated2024-07-22

Description

EGroupware before 23.1.20240624 mishandles an ORDER BY clause. This leads to json.php?menuaction=EGroupware\Api\Etemplate\Widget\Nextmatch::ajax_get_rows sort.id SQL injection by authenticated users for Address Book or InfoLog sorting.

References

https://syss.de

https://github.com/EGroupware/egroupware/releases/tag/23.1.20240624

https://help.egroupware.org/t/egroupware-maintenance-security-release-23-1-20240624/78438

https://github.com/EGroupware/egroupware/compare/23.1.20240430...23.1.20240624

https://github.com/EGroupware/egroupware/commit/553829d30cc2ccdc0e5a8c5a0e16fa03a3399a3f

https://www.syss.de/pentest-blog/sql-injection-schwachstelle-in-egroupware-syss-2024-047

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-047.txt

cve.org CVE-2024-40614

nvd.nist.gov CVE-2024-40614

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-40614
© Copyright 2024 THREATINT. Made in Cyprus with +