A boolean-based SQL injection issue in the Virtual Meeting Password (VMP) endpoint in R-HUB TurboMeeting through 8.x allows unauthenticated remote attackers to extract hashed passwords from the database, and authenticate to the application, via crafted SQL input.
References
Link | Resource |
---|---|
https://github.com/google/security-research/security/advisories/GHSA-vx5j-8pgx-v42v | Exploit Third Party Advisory |
https://www.rhubcom.com/v5/manuals.html | Product |
https://github.com/google/security-research/security/advisories/GHSA-vx5j-8pgx-v42v | Exploit Third Party Advisory |
https://www.rhubcom.com/v5/manuals.html | Product |
Configurations
History
No history.
Information
Published : 2024-07-25 20:15
Updated : 2024-11-21 09:25
NVD link : CVE-2024-38289
Mitre link : CVE-2024-38289
CVE.ORG link : CVE-2024-38289
JSON object : View
Products Affected
rhubcom
- turbomeeting
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')