Search criteria

6 vulnerabilities by qualitor

CVE-2025-14580 (GCVE-0-2025-14580)

Vulnerability from cvelistv5 – Published: 2025-12-12 20:32 – Updated: 2025-12-15 18:11
VLAI?
Title
Qualitor viewDocumento.php cross site scripting
Summary
A security vulnerability has been detected in Qualitor up to 8.24.73. The impacted element is an unknown function of the file /Qualitor/html/bc/bcdocumento9/biblioteca/request/viewDocumento.php. Such manipulation of the argument cdscript leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. It is suggested to upgrade the affected component. The vendor confirms the existence of the issue: "We became aware of the issue through an earlier direct notification from the original reporter, and our engineering team promptly investigated and implemented the necessary corrective measures. (...) Updated versions containing the fix have already been provided to our customer base".
CWE
Assigner
References
https://vuldb.com/?id.336201 vdb-entrytechnical-description
https://vuldb.com/?ctiid.336201 signaturepermissions-required
https://vuldb.com/?submit.705193 third-party-advisory
Impacted products
Vendor Product Version
n/a Qualitor Affected: 8.24.0
Affected: 8.24.1
Affected: 8.24.2
Affected: 8.24.3
Affected: 8.24.4
Affected: 8.24.5
Affected: 8.24.6
Affected: 8.24.7
Affected: 8.24.8
Affected: 8.24.9
Affected: 8.24.10
Affected: 8.24.11
Affected: 8.24.12
Affected: 8.24.13
Affected: 8.24.14
Affected: 8.24.15
Affected: 8.24.16
Affected: 8.24.17
Affected: 8.24.18
Affected: 8.24.19
Affected: 8.24.20
Affected: 8.24.21
Affected: 8.24.22
Affected: 8.24.23
Affected: 8.24.24
Affected: 8.24.25
Affected: 8.24.26
Affected: 8.24.27
Affected: 8.24.28
Affected: 8.24.29
Affected: 8.24.30
Affected: 8.24.31
Affected: 8.24.32
Affected: 8.24.33
Affected: 8.24.34
Affected: 8.24.35
Affected: 8.24.36
Affected: 8.24.37
Affected: 8.24.38
Affected: 8.24.39
Affected: 8.24.40
Affected: 8.24.41
Affected: 8.24.42
Affected: 8.24.43
Affected: 8.24.44
Affected: 8.24.45
Affected: 8.24.46
Affected: 8.24.47
Affected: 8.24.48
Affected: 8.24.49
Affected: 8.24.50
Affected: 8.24.51
Affected: 8.24.52
Affected: 8.24.53
Affected: 8.24.54
Affected: 8.24.55
Affected: 8.24.56
Affected: 8.24.57
Affected: 8.24.58
Affected: 8.24.59
Affected: 8.24.60
Affected: 8.24.61
Affected: 8.24.62
Affected: 8.24.63
Affected: 8.24.64
Affected: 8.24.65
Affected: 8.24.66
Affected: 8.24.67
Affected: 8.24.68
Affected: 8.24.69
Affected: 8.24.70
Affected: 8.24.71
Affected: 8.24.72
Affected: 8.24.73
Credits
chor4o (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-14580",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-15T18:06:21.441200Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-15T18:11:46.065Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Qualitor",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "8.24.0"
            },
            {
              "status": "affected",
              "version": "8.24.1"
            },
            {
              "status": "affected",
              "version": "8.24.2"
            },
            {
              "status": "affected",
              "version": "8.24.3"
            },
            {
              "status": "affected",
              "version": "8.24.4"
            },
            {
              "status": "affected",
              "version": "8.24.5"
            },
            {
              "status": "affected",
              "version": "8.24.6"
            },
            {
              "status": "affected",
              "version": "8.24.7"
            },
            {
              "status": "affected",
              "version": "8.24.8"
            },
            {
              "status": "affected",
              "version": "8.24.9"
            },
            {
              "status": "affected",
              "version": "8.24.10"
            },
            {
              "status": "affected",
              "version": "8.24.11"
            },
            {
              "status": "affected",
              "version": "8.24.12"
            },
            {
              "status": "affected",
              "version": "8.24.13"
            },
            {
              "status": "affected",
              "version": "8.24.14"
            },
            {
              "status": "affected",
              "version": "8.24.15"
            },
            {
              "status": "affected",
              "version": "8.24.16"
            },
            {
              "status": "affected",
              "version": "8.24.17"
            },
            {
              "status": "affected",
              "version": "8.24.18"
            },
            {
              "status": "affected",
              "version": "8.24.19"
            },
            {
              "status": "affected",
              "version": "8.24.20"
            },
            {
              "status": "affected",
              "version": "8.24.21"
            },
            {
              "status": "affected",
              "version": "8.24.22"
            },
            {
              "status": "affected",
              "version": "8.24.23"
            },
            {
              "status": "affected",
              "version": "8.24.24"
            },
            {
              "status": "affected",
              "version": "8.24.25"
            },
            {
              "status": "affected",
              "version": "8.24.26"
            },
            {
              "status": "affected",
              "version": "8.24.27"
            },
            {
              "status": "affected",
              "version": "8.24.28"
            },
            {
              "status": "affected",
              "version": "8.24.29"
            },
            {
              "status": "affected",
              "version": "8.24.30"
            },
            {
              "status": "affected",
              "version": "8.24.31"
            },
            {
              "status": "affected",
              "version": "8.24.32"
            },
            {
              "status": "affected",
              "version": "8.24.33"
            },
            {
              "status": "affected",
              "version": "8.24.34"
            },
            {
              "status": "affected",
              "version": "8.24.35"
            },
            {
              "status": "affected",
              "version": "8.24.36"
            },
            {
              "status": "affected",
              "version": "8.24.37"
            },
            {
              "status": "affected",
              "version": "8.24.38"
            },
            {
              "status": "affected",
              "version": "8.24.39"
            },
            {
              "status": "affected",
              "version": "8.24.40"
            },
            {
              "status": "affected",
              "version": "8.24.41"
            },
            {
              "status": "affected",
              "version": "8.24.42"
            },
            {
              "status": "affected",
              "version": "8.24.43"
            },
            {
              "status": "affected",
              "version": "8.24.44"
            },
            {
              "status": "affected",
              "version": "8.24.45"
            },
            {
              "status": "affected",
              "version": "8.24.46"
            },
            {
              "status": "affected",
              "version": "8.24.47"
            },
            {
              "status": "affected",
              "version": "8.24.48"
            },
            {
              "status": "affected",
              "version": "8.24.49"
            },
            {
              "status": "affected",
              "version": "8.24.50"
            },
            {
              "status": "affected",
              "version": "8.24.51"
            },
            {
              "status": "affected",
              "version": "8.24.52"
            },
            {
              "status": "affected",
              "version": "8.24.53"
            },
            {
              "status": "affected",
              "version": "8.24.54"
            },
            {
              "status": "affected",
              "version": "8.24.55"
            },
            {
              "status": "affected",
              "version": "8.24.56"
            },
            {
              "status": "affected",
              "version": "8.24.57"
            },
            {
              "status": "affected",
              "version": "8.24.58"
            },
            {
              "status": "affected",
              "version": "8.24.59"
            },
            {
              "status": "affected",
              "version": "8.24.60"
            },
            {
              "status": "affected",
              "version": "8.24.61"
            },
            {
              "status": "affected",
              "version": "8.24.62"
            },
            {
              "status": "affected",
              "version": "8.24.63"
            },
            {
              "status": "affected",
              "version": "8.24.64"
            },
            {
              "status": "affected",
              "version": "8.24.65"
            },
            {
              "status": "affected",
              "version": "8.24.66"
            },
            {
              "status": "affected",
              "version": "8.24.67"
            },
            {
              "status": "affected",
              "version": "8.24.68"
            },
            {
              "status": "affected",
              "version": "8.24.69"
            },
            {
              "status": "affected",
              "version": "8.24.70"
            },
            {
              "status": "affected",
              "version": "8.24.71"
            },
            {
              "status": "affected",
              "version": "8.24.72"
            },
            {
              "status": "affected",
              "version": "8.24.73"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "chor4o (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A security vulnerability has been detected in Qualitor up to 8.24.73. The impacted element is an unknown function of the file /Qualitor/html/bc/bcdocumento9/biblioteca/request/viewDocumento.php. Such manipulation of the argument cdscript leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. It is suggested to upgrade the affected component. The vendor confirms the existence of the issue: \"We became aware of the issue through an earlier direct notification from the original reporter, and our engineering team promptly investigated and implemented the necessary corrective measures. (...) Updated versions containing the fix have already been provided to our customer base\"."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 4,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Cross Site Scripting",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "Code Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-12T20:32:06.152Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-336201 | Qualitor viewDocumento.php cross site scripting",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.336201"
        },
        {
          "name": "VDB-336201 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.336201"
        },
        {
          "name": "Submit #705193 | Qualitor  8.20.77 -  8.24.73 Cross Site Scripting",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.705193"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-12-12T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-12-12T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-12-12T15:51:19.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Qualitor viewDocumento.php cross site scripting"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-14580",
    "datePublished": "2025-12-12T20:32:06.152Z",
    "dateReserved": "2025-12-12T14:46:09.470Z",
    "dateUpdated": "2025-12-15T18:11:46.065Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-5139 (GCVE-0-2025-5139)

Vulnerability from cvelistv5 – Published: 2025-05-25 01:00 – Updated: 2025-06-11 13:38
VLAI?
Title
Qualitor Office 365-type Connection testaConexaoOffice365.php command injection
Summary
A vulnerability was found in Qualitor 8.20/8.24. It has been rated as critical. Affected by this issue is some unknown functionality of the file /html/ad/adconexaooffice365/request/testaConexaoOffice365.php of the component Office 365-type Connection Handler. The manipulation of the argument nmconexao leads to command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 8.20.56 and 8.24.31 is able to address this issue. It is recommended to upgrade the affected component.
CWE
Assigner
References
Impacted products
Vendor Product Version
n/a Qualitor Affected: 8.20
Affected: 8.24
Unaffected: 8.20.56
Unaffected: 8.24.31
Credits
matheuzsec (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-5139",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-28T17:29:16.473374Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-28T17:39:10.057Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Office 365-type Connection Handler"
          ],
          "product": "Qualitor",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "8.20"
            },
            {
              "status": "affected",
              "version": "8.24"
            },
            {
              "status": "unaffected",
              "version": "8.20.56"
            },
            {
              "status": "unaffected",
              "version": "8.24.31"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "matheuzsec (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in Qualitor 8.20/8.24. It has been rated as critical. Affected by this issue is some unknown functionality of the file /html/ad/adconexaooffice365/request/testaConexaoOffice365.php of the component Office 365-type Connection Handler. The manipulation of the argument nmconexao leads to command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 8.20.56 and 8.24.31 is able to address this issue. It is recommended to upgrade the affected component."
        },
        {
          "lang": "de",
          "value": "Eine kritische Schwachstelle wurde in Qualitor 8.20/8.24 ausgemacht. Davon betroffen ist unbekannter Code der Datei /html/ad/adconexaooffice365/request/testaConexaoOffice365.php der Komponente Office 365-type Connection Handler. Durch das Beeinflussen des Arguments nmconexao mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 8.20.56 and 8.24.31 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-74",
              "description": "Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-11T13:38:12.795Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-310220 | Qualitor Office 365-type Connection testaConexaoOffice365.php command injection",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.310220"
        },
        {
          "name": "VDB-310220 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.310220"
        },
        {
          "name": "Submit #572477 | Qualitor Qualitor Web 8.20. - BD 206 Command Injection",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.572477"
        },
        {
          "tags": [
            "media-coverage"
          ],
          "url": "https://www.youtube.com/watch?v=Dq4C5s9Uwyo"
        },
        {
          "tags": [
            "broken-link",
            "exploit"
          ],
          "url": "https://gist.githubusercontent.com/MatheuZSecurity/fe221fd5b2e5393abf76be42f11f52c3/raw/e8d9c63885f0b83b3374db3d31dbe2c69c868334/poc.sh"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-05-23T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-05-23T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-06-11T15:42:58.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Qualitor Office 365-type Connection testaConexaoOffice365.php command injection"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-5139",
    "datePublished": "2025-05-25T01:00:07.429Z",
    "dateReserved": "2025-05-23T18:56:55.098Z",
    "dateUpdated": "2025-06-11T13:38:12.795Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-48359 (GCVE-0-2024-48359)

Vulnerability from cvelistv5 – Published: 2024-10-31 00:00 – Updated: 2025-06-12 16:34
VLAI?
Summary
Qualitor v8.24 was discovered to contain a remote code execution (RCE) vulnerability via the gridValoresPopHidden parameter.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:qualitor:qualitor:8.24:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "qualitor",
            "vendor": "qualitor",
            "versions": [
              {
                "status": "affected",
                "version": "8.24"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-48359",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-01T20:44:35.597766Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-01T20:45:40.498Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Qualitor v8.24 was discovered to contain a remote code execution (RCE) vulnerability via the gridValoresPopHidden parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-12T16:34:54.344Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/OpenXP-Research/CVE-2024-48359"
        },
        {
          "url": "https://www.qualitor.com.br/official-security-advisory-cve-2024-48359"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-48359",
    "datePublished": "2024-10-31T00:00:00.000Z",
    "dateReserved": "2024-10-08T00:00:00.000Z",
    "dateUpdated": "2025-06-12T16:34:54.344Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-48360 (GCVE-0-2024-48360)

Vulnerability from cvelistv5 – Published: 2024-10-31 00:00 – Updated: 2025-06-12 16:28
VLAI?
Summary
Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:qualitor:qualitor:8.24:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "qualitor",
            "vendor": "qualitor",
            "versions": [
              {
                "status": "affected",
                "version": "8.24"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-48360",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-01T20:42:39.761688Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-918",
                "description": "CWE-918 Server-Side Request Forgery (SSRF)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-01T20:46:09.798Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-12T16:28:08.957Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.qualitor.com.br/qualitor-8-20"
        },
        {
          "url": "https://github.com/OpenXP-Research/CVE-2024-48360"
        },
        {
          "url": "https://www.qualitor.com.br/official-security-advisory-cve-2024-48360"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-48360",
    "datePublished": "2024-10-31T00:00:00.000Z",
    "dateReserved": "2024-10-08T00:00:00.000Z",
    "dateUpdated": "2025-06-12T16:28:08.957Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-44849 (GCVE-0-2024-44849)

Vulnerability from cvelistv5 – Published: 2024-09-09 00:00 – Updated: 2025-06-12 16:31
VLAI?
Summary
Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:qualitor:qalitor:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "qalitor",
            "vendor": "qualitor",
            "versions": [
              {
                "lessThanOrEqual": "8.24",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-44849",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-09T19:19:43.132083Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-434",
                "description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-09T19:28:24.017Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-12T16:31:23.877Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/extencil/CVE-2024-44849?tab=readme-ov-file"
        },
        {
          "url": "https://blog.extencil.me/information-security/cves/cve-2024-44849"
        },
        {
          "url": "https://www.qualitor.com.br/official-security-advisory-cve-2024-44849"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-44849",
    "datePublished": "2024-09-09T00:00:00.000Z",
    "dateReserved": "2024-08-21T00:00:00.000Z",
    "dateUpdated": "2025-06-12T16:31:23.877Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-47253 (GCVE-0-2023-47253)

Vulnerability from cvelistv5 – Published: 2023-11-06 00:00 – Updated: 2025-06-12 16:38
VLAI?
Summary
Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T21:09:35.888Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.linkedin.com/in/xvinicius/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.linkedin.com/in/hairrison-wenning-4631a4124/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.qualitor.com.br/qualitor-8-20"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://openxp.xpsec.co/blog/cve-2023-47253"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:qualitor:qalitor:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "qalitor",
            "vendor": "qualitor",
            "versions": [
              {
                "lessThanOrEqual": "8.20",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-47253",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-05T19:44:13.137293Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-77",
                "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-05T19:48:54.842Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-12T16:38:22.382Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.linkedin.com/in/xvinicius/"
        },
        {
          "url": "https://www.linkedin.com/in/hairrison-wenning-4631a4124/"
        },
        {
          "url": "https://www.qualitor.com.br/qualitor-8-20"
        },
        {
          "url": "https://openxp.xpsec.co/blog/cve-2023-47253"
        },
        {
          "url": "https://www.qualitor.com.br/official-security-advisory-cve-2023-47253"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-47253",
    "datePublished": "2023-11-06T00:00:00.000Z",
    "dateReserved": "2023-11-05T00:00:00.000Z",
    "dateUpdated": "2025-06-12T16:38:22.382Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}