Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f64q-6vqx-982f

Опубликовано: 21 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

Log2Space Subscriber Management Software 1.1 is vulnerable to unauthenticated SQL injection via the lead_id parameter in the /l2s/api/selfcareLeadHistory endpoint. A remote attacker can exploit this by sending a specially crafted POST request, resulting in the execution of arbitrary SQL queries. The backend fails to sanitize the user input, allowing enumeration of database schemas, table names, and potentially leading to full database compromise.

Log2Space Subscriber Management Software 1.1 is vulnerable to unauthenticated SQL injection via the lead_id parameter in the /l2s/api/selfcareLeadHistory endpoint. A remote attacker can exploit this by sending a specially crafted POST request, resulting in the execution of arbitrary SQL queries. The backend fails to sanitize the user input, allowing enumeration of database schemas, table names, and potentially leading to full database compromise.

EPSS

Процентиль: 35%
0.00146
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 6.5
nvd
4 месяца назад

Log2Space Subscriber Management Software 1.1 is vulnerable to unauthenticated SQL injection via the `lead_id` parameter in the `/l2s/api/selfcareLeadHistory` endpoint. A remote attacker can exploit this by sending a specially crafted POST request, resulting in the execution of arbitrary SQL queries. The backend fails to sanitize the user input, allowing enumeration of database schemas, table names, and potentially leading to full database compromise.

EPSS

Процентиль: 35%
0.00146
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-89