CVE-2022-24848

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24848
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24848.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24848
Aliases
  • GHSA-52vp-f7hj-cj92
Published
2022-06-01T17:20:14Z
Modified
2025-10-22T18:29:44.196931Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
SQL Injection in DHIS2's in OrgUnit program association
Details

DHIS2 is an information system for data capture, management, validation, analytics and visualization. A SQL injection security vulnerability affects the /api/programs/orgUnits?programs= API endpoint in DHIS2 versions prior to 2.36.10.1 and 2.37.6.1. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. The vulnerability is not exposed to a non-malicious user and requires a conscious attack to be exploited. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance's database. Security patches are now available for DHIS2 versions 2.36.10.1 and 2.37.6.1. One may apply mitigations at the web proxy level as a workaround. More information about these mitigations is available in the GitHub Security Advisory.

Database specific
{
    "cwe_ids": [
        "CWE-89"
    ]
}
References

Affected packages

Git / github.com/dhis2/dhis2-core

Affected ranges

Type
GIT
Repo
https://github.com/dhis2/dhis2-core
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Type
GIT
Repo
https://github.com/dhis2/dhis2-core
Events

Affected versions

2.*

2.36.10
2.36.8
2.36.9