We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | GitHub_M |
Reserved | 2024-07-22 |
Published | 2024-07-30 |
Updated | 2024-08-02 |
Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the API route inside the CMS responsible for Adding/Editing DataSet Column Formulas. This allows an authenticated user to to obtain and modify arbitrary data from the Xibo database by injecting specially crafted values in to the `formula` parameter. Users should upgrade to version 3.3.12 or 4.0.14 which fix this issue.
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-4pp3-4mw7-qfwr
https://github.com/xibosignage/xibo-cms/commit/39a2fd54b3f08831b0004aa2015bd8a753bc567f.patch
https://xibosignage.com/blog/security-advisory-2024-07