CVE-2024-30163

Invision Community before 4.7.16 allow SQL injection via the applications/nexus/modules/front/store/store.php IPS\nexus\modules\front\store\_store::_categoryView() method, where user input passed through the filter request parameter is not properly sanitized before being used to execute SQL queries. This can be exploited by unauthenticated attackers to carry out Blind SQL Injection attacks.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:invisioncommunity:invisioncommunity:*:*:*:*:*:*:*:*

History

08 Aug 2024, 21:25

Type Values Removed Values Added
References () https://invisioncommunity.com/release-notes/4716-r128/ - () https://invisioncommunity.com/release-notes/4716-r128/ - Release Notes
References () http://seclists.org/fulldisclosure/2024/Apr/20 - () http://seclists.org/fulldisclosure/2024/Apr/20 - Exploit, Mailing List, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Invisioncommunity invisioncommunity
Invisioncommunity
CWE CWE-89
CPE cpe:2.3:a:invisioncommunity:invisioncommunity:*:*:*:*:*:*:*:*

07 Jun 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-07 17:15

Updated : 2025-03-19 17:15


NVD link : CVE-2024-30163

Mitre link : CVE-2024-30163


JSON object : View

Products Affected

invisioncommunity

  • invisioncommunity
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')