{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0784","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-22T11:17:58.086Z","datePublished":"2024-01-22T17:31:04.653Z","dateUpdated":"2025-05-30T14:22:37.505Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-01-25T14:25:47.071Z"},"title":"hongmaple octopus list sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"hongmaple","product":"octopus","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in hongmaple octopus 1.0. It has been classified as critical. Affected is an unknown function of the file /system/role/list. The manipulation of the argument dataScope leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-251700."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in hongmaple octopus 1.0 ausgemacht. Es betrifft eine unbekannte Funktion der Datei /system/role/list. Durch das Beeinflussen des Arguments dataScope mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Dieses Produkt verzichtet auf eine Versionierung und verwendet stattdessen Rolling Releases. Deshalb sind keine Details zu betroffenen oder zu aktualisierende Versionen vorhanden."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-01-22T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-22T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-25T15:30:40.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"biantaibao (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.251700","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.251700","tags":["signature","permissions-required"]},{"url":"https://github.com/biantaibao/octopus_SQL/blob/main/report.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:18:18.614Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.251700","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.251700","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/biantaibao/octopus_SQL/blob/main/report.md","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-08T20:11:28.489898Z","id":"CVE-2024-0784","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-30T14:22:37.505Z"}}]}}