{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7188","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-07-28T05:39:39.791Z","datePublished":"2024-07-29T07:00:10.139Z","dateUpdated":"2024-08-01T21:52:31.086Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-07-29T07:00:10.139Z"},"title":"Bylancer Quicklancer GET Parameter listing sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"Bylancer","product":"Quicklancer","versions":[{"version":"2.4","status":"affected"}],"modules":["GET Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Bylancer Quicklancer 2.4. It has been rated as critical. This issue affects some unknown processing of the file /listing of the component GET Parameter Handler. The manipulation of the argument range2 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272609 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in Bylancer Quicklancer 2.4 ausgemacht. Sie wurde als kritisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /listing der Komponente GET Parameter Handler. Durch das Manipulieren des Arguments range2 mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-07-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-07-28T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-07-28T07:44:55.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"godfather (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.272609","name":"VDB-272609 | Bylancer Quicklancer GET Parameter listing sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.272609","name":"VDB-272609 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.378279","name":"Submit #378279 | Bylancer Quicklancer 2.4 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/bigb0x/CVEs/blob/main/quicklancer-2-4.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"bylancer","product":"quicklancer","cpes":["cpe:2.3:a:bylancer:quicklancer:2.4:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.4","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-29T13:52:23.541420Z","id":"CVE-2024-7188","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-29T13:54:03.756Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:52:31.086Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.272609","name":"VDB-272609 | Bylancer Quicklancer GET Parameter listing sql injection","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.272609","name":"VDB-272609 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.378279","name":"Submit #378279 | Bylancer Quicklancer 2.4 SQL Injection","tags":["third-party-advisory","x_transferred"]},{"url":"https://github.com/bigb0x/CVEs/blob/main/quicklancer-2-4.md","tags":["exploit","x_transferred"]}]}]}}