Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the API routes inside the CMS responsible for Filtering DataSets. This allows an authenticated user to to obtain arbitrary data from the Xibo database by injecting specially crafted values in to the API for viewing DataSet data. Users should upgrade to version 3.3.12 or 4.0.14 which fix this issue.
References
Link | Resource |
---|---|
https://github.com/xibosignage/xibo-cms/commit/39a2fd54b3f08831b0004aa2015bd8a753bc567f.patch | Patch Vendor Advisory |
https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-hpc5-mxfq-44hv | Patch Vendor Advisory |
https://xibosignage.com/blog/security-advisory-2024-07 | Vendor Advisory |
https://github.com/xibosignage/xibo-cms/commit/39a2fd54b3f08831b0004aa2015bd8a753bc567f.patch | Patch Vendor Advisory |
https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-hpc5-mxfq-44hv | Patch Vendor Advisory |
https://xibosignage.com/blog/security-advisory-2024-07 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-07-30 16:15
Updated : 2024-11-21 09:33
NVD link : CVE-2024-41803
Mitre link : CVE-2024-41803
CVE.ORG link : CVE-2024-41803
JSON object : View
Products Affected
xibosignage
- xibo
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')