A vulnerability was found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ajax/checkin.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfanzu-CMS/dingfanzu-CMS%20checkin.php%20username%20SQL-inject.md | Exploit | 
| https://vuldb.com/?ctiid.276073 | Permissions Required VDB Entry | 
| https://vuldb.com/?id.276073 | VDB Entry | 
| https://vuldb.com/?submit.396294 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    No history.
Information
                Published : 2024-08-29 13:15
Updated : 2024-08-30 15:24
NVD link : CVE-2024-8301
Mitre link : CVE-2024-8301
CVE.ORG link : CVE-2024-8301
JSON object : View
Products Affected
                gitapp
- dingfanzu
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
