An issue was discovered in Jorani 0.6.5. SQL Injection (error-based) allows a user of the application without permissions to read and modify sensitive information from the database used by the application via the startdate or enddate parameter to leaves/validate.
References
Link | Resource |
---|---|
https://github.com/bbalet/jorani/issues/254 | Issue Tracking Vendor Advisory |
https://hackpuntes.com/cve-2018-15918-jorani-leave-management-system-0-6-5-sql-injection/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/45340/ | Third Party Advisory VDB Entry |
https://github.com/bbalet/jorani/issues/254 | Issue Tracking Vendor Advisory |
https://hackpuntes.com/cve-2018-15918-jorani-leave-management-system-0-6-5-sql-injection/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/45340/ | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2018-09-05 21:29
Updated : 2024-11-21 03:51
NVD link : CVE-2018-15918
Mitre link : CVE-2018-15918
CVE.ORG link : CVE-2018-15918
JSON object : View
Products Affected
jorani_project
- jorani
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')