CVE-2024-6470

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-6470
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6470.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-6470
Published
2024-07-03T13:15:03Z
Modified
2025-04-08T04:01:46.087499Z
Severity
  • 2.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was found in playSMS 1.4.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php?app=main&inc=feature_inboxgroup&op=list of the component Template Handler. The manipulation of the argument Receiver Number with the input {{id}} leads to injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-270278 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Git / github.com/playsms/playsms

Affected ranges

Type
GIT
Repo
https://github.com/playsms/playsms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.9.5
0.9.5.1
0.9.5.2
0.9.5.3
0.9.6
0.9.7
0.9.7-beta1
0.9.7-beta2
0.9.7.1
0.9.8
0.9.8-beta1
0.9.8-beta2
0.9.9
0.9.9-beta1
0.9.9-beta2
0.9.9-beta3
0.9.9.1
0.9.9.1-beta1
0.9.9.1-beta2
0.9.9.1-beta3
0.9.9.2
0.9.9.2-beta1
0.9.9.2-beta2
0.9.9.2-beta3
0.9.9.2-beta4
0.9.9.2-beta5
0.9.9.2-beta6
0.9.9.2-rc

1.*

1.0
1.0-beta1
1.0-beta2
1.0-beta3
1.0-beta4
1.0-beta5
1.0-rc1
1.0-rc2
1.0-rc3
1.0-rc4
1.0-rc5
1.0-rc6
1.0-rc7
1.0-rc8
1.0-rc9
1.1
1.2
1.2.1
1.3
1.3.1
1.4
1.4-beta1
1.4-beta2
1.4-beta3
1.4.1
1.4.2
1.4.3