RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the file_id parameter at /CorporateCulture/kaizen_download.aspx.
References
Link | Resource |
---|---|
https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#kaizen_downloadaspx | Exploit Third Party Advisory |
https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#kaizen_downloadaspx | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Apr 2025, 19:02
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ruvar:ruvaroa:12.01:*:*:*:*:*:*:* cpe:2.3:a:ruvar:ruvaroa:6.01:*:*:*:*:*:*:* |
|
References | () https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#kaizen_downloadaspx - Exploit, Third Party Advisory | |
First Time |
Ruvar
Ruvar ruvaroa |
Information
Published : 2024-05-07 19:15
Updated : 2025-04-16 19:02
NVD link : CVE-2024-25513
Mitre link : CVE-2024-25513
CVE.ORG link : CVE-2024-25513
JSON object : View
Products Affected
ruvar
- ruvaroa
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')