CVE-2024-32493

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-32493
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-32493.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-32493
Related
Published
2024-04-29T17:15:19Z
Modified
2024-09-18T03:26:15.923604Z
Summary
[none]
Details

An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in agent is able to inject SQL in the draft form ID parameter of an AJAX request.

References

Affected packages

Debian:12 / znuny

Package

Name
znuny
Purl
pkg:deb/debian/znuny?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.3.2-3
6.3.3-1~bpo11+1
6.3.3-1
6.3.4-1~bpo11+1
6.3.4-1
6.4.2-1~bpo11+1
6.4.2-1
6.4.2-2
6.4.3-1~bpo11+1
6.4.3-1
6.4.4-1
6.4.5-1~bpo11+1
6.4.5-1
6.4.5-2
6.5.1-1
6.5.3-1~bpo12+1
6.5.3-1
6.5.4-1~bpo12+1
6.5.4-1
6.5.5-1~bpo12+1
6.5.5-1
6.5.6-1~bpo12+1
6.5.6-1
6.5.8-1~bpo12+1
6.5.8-1
6.5.9-1~bpo12+1
6.5.9-1
6.5.10-1~bpo12+1
6.5.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / znuny

Package

Name
znuny
Purl
pkg:deb/debian/znuny?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.8-1

Affected versions

6.*

6.3.2-3
6.3.3-1~bpo11+1
6.3.3-1
6.3.4-1~bpo11+1
6.3.4-1
6.4.2-1~bpo11+1
6.4.2-1
6.4.2-2
6.4.3-1~bpo11+1
6.4.3-1
6.4.4-1
6.4.5-1~bpo11+1
6.4.5-1
6.4.5-2
6.5.1-1
6.5.3-1~bpo12+1
6.5.3-1
6.5.4-1~bpo12+1
6.5.4-1
6.5.5-1~bpo12+1
6.5.5-1
6.5.6-1~bpo12+1
6.5.6-1
6.5.8-1~bpo12+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}