SQL injection vulnerability in SEUR plugin

Posted date 10/10/2024
Identificador
INCIBE-2024-0504
Importance
5 - Critical
Affected Resources

SEUR plugin, versions prior to 2.5.11.

Description

INCIBE has coordinated the publication of 1 vulnerability of critical severity that affects the plugin developed by SEUR, versions 2.5.11 and earlier, which has been discovered by researchers Ángel Heredia Pérez and Daniel Collado Tomé, from Telefónica Tech.

This vulnerability has been assigned the following code, CVSS v3.1 base score, CVSS vector and vulnerability type CWE:

  • CVE-2024-9201: 9.4 | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L | CWE-89
Solution

This vulnerability has already been fixed by SEUR in version 2.5.11, published on 16/04/2024. The latest version available is 2.5.14. SEUR recommends its customers to connect to its platform to download and update to the latest version of the module.

Detail

CVE-2024-9201: the SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint.

References list