A vulnerability was found in BradWenqiang HR 2.0. It has been rated as critical. Affected by this issue is the function selectAll of the file /bishe/register of the component Background Management. The manipulation of the argument userName leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-256886 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/zuizui35/cve/blob/main/cve.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.256886 | Permissions Required |
https://vuldb.com/?id.256886 | Permissions Required |
https://github.com/zuizui35/cve/blob/main/cve.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.256886 | Permissions Required |
https://vuldb.com/?id.256886 | Permissions Required |
Configurations
History
23 Jan 2025, 19:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:bradwenqiang:hr:2.0:*:*:*:*:*:*:* | |
First Time |
Bradwenqiang
Bradwenqiang hr |
|
References | () https://github.com/zuizui35/cve/blob/main/cve.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.256886 - Permissions Required | |
References | () https://vuldb.com/?id.256886 - Permissions Required |
21 Nov 2024, 09:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/zuizui35/cve/blob/main/cve.md - | |
References | () https://vuldb.com/?ctiid.256886 - | |
References | () https://vuldb.com/?id.256886 - |
21 Mar 2024, 02:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Mar 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-15 06:15
Updated : 2025-01-23 19:24
NVD link : CVE-2024-2478
Mitre link : CVE-2024-2478
CVE.ORG link : CVE-2024-2478
JSON object : View
Products Affected
bradwenqiang
- hr
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')