CVE-2024-25400

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-25400
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-25400.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-25400
Withdrawn
2024-06-17T20:01:01Z
Published
2024-02-27T16:15:46Z
Modified
2025-05-24T02:59:45.059190Z
Summary
[none]
Details

Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php. NOTE: this is disputed by multiple third parties because it refers to an HTTP request to a PHP file that only contains a class, without any mechanism for accepting external input, and the reportedly vulnerable method is not present in the file.

References

Affected packages

Git / github.com/intelliants/subrion

Affected ranges

Type
GIT
Repo
https://github.com/intelliants/subrion
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v4.*

v4.0.0
v4.0.1
v4.0.2
v4.0.3
v4.0.4
v4.0.5
v4.1.0
v4.1.1
v4.1.2
v4.1.3
v4.1.4
v4.1.5
v4.2.0
v4.2.1