Логотип exploitDog
bind:CVE-2024-47062
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-47062

Количество 3

Количество 3

nvd логотип

CVE-2024-47062

больше 1 года назад

Navidrome is an open source web-based music collection server and streamer. Navidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like `password=...` in the URL (ORM Leak). Furthermore, the names of the parameters are not properly escaped, leading to SQL Injections. Finally, the username is used in a `LIKE` statement, allowing people to log in with `%` instead of their username. When adding parameters to the URL, they are automatically included in an SQL `LIKE` statement (depending on the parameter's name). This allows attackers to potentially retrieve arbitrary information. For example, attackers can use the following request to test whether some encrypted passwords start with `AAA`. This results in an SQL query like `password LIKE 'AAA%'`, allowing attackers to slowly brute-force passwords. When adding parameters to the URL, they are automatically added to an SQL query. The names of the parameters are not p

CVSS3: 8.8
EPSS: Высокий
github логотип

GHSA-58vj-cv5w-v4v6

больше 1 года назад

Navidrome has Multiple SQL Injections and ORM Leak

CVSS3: 8.8
EPSS: Высокий
fstec логотип

BDU:2024-08268

больше 1 года назад

Уязвимость медиасервера Navidrome, связанная с непринятием мер по защите структуры запроса SQL, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию

CVSS3: 9.9
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-47062

Navidrome is an open source web-based music collection server and streamer. Navidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like `password=...` in the URL (ORM Leak). Furthermore, the names of the parameters are not properly escaped, leading to SQL Injections. Finally, the username is used in a `LIKE` statement, allowing people to log in with `%` instead of their username. When adding parameters to the URL, they are automatically included in an SQL `LIKE` statement (depending on the parameter's name). This allows attackers to potentially retrieve arbitrary information. For example, attackers can use the following request to test whether some encrypted passwords start with `AAA`. This results in an SQL query like `password LIKE 'AAA%'`, allowing attackers to slowly brute-force passwords. When adding parameters to the URL, they are automatically added to an SQL query. The names of the parameters are not p

CVSS3: 8.8
86%
Высокий
больше 1 года назад
github логотип
GHSA-58vj-cv5w-v4v6

Navidrome has Multiple SQL Injections and ORM Leak

CVSS3: 8.8
86%
Высокий
больше 1 года назад
fstec логотип
BDU:2024-08268

Уязвимость медиасервера Navidrome, связанная с непринятием мер по защите структуры запроса SQL, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию

CVSS3: 9.9
86%
Высокий
больше 1 года назад

Уязвимостей на страницу