CVE-2024-28094 (GCVE-0-2024-28094)
Vulnerability from cvelistv5 – Published: 2024-03-07 03:14 – Updated: 2024-08-02 00:48
VLAI?
Title
Blind SQL Injection in Chat functionality in Schoolbox
Summary
Chat functionality in Schoolbox application before
version 23.1.3 is vulnerable to blind SQL Injection enabling the
authenticated attackers to read, modify, and delete database records.
Severity ?
8.8 (High)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Schoolbox Pty Ltd | Schoolbox |
Affected:
0 , < 23.1.3
(Minor)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-28094",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-07T18:31:38.565724Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T18:03:28.556Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T00:48:48.241Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.themissinglink.com.au/security-advisories/cve-2024-28094"
},
{
"tags": [
"x_transferred"
],
"url": "https://schoolbox.education/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Schoolbox",
"vendor": "Schoolbox Pty Ltd",
"versions": [
{
"lessThan": "23.1.3",
"status": "affected",
"version": "0",
"versionType": "Minor"
}
]
}
],
"datePublic": "2024-03-06T08:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Chat functionality in Schoolbox application before\n version 23.1.3 is vulnerable to blind SQL Injection enabling the \nauthenticated attackers to read, modify, and delete database records."
}
],
"value": "Chat functionality in Schoolbox application before\n version 23.1.3 is vulnerable to blind SQL Injection enabling the \nauthenticated attackers to read, modify, and delete database records."
}
],
"impacts": [
{
"capecId": "CAPEC-7",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-7 Blind SQL Injection"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-07T03:14:25.843Z",
"orgId": "07aac9b9-e3e9-4d03-a447-764bd31371d7",
"shortName": "TML"
},
"references": [
{
"url": "https://www.themissinglink.com.au/security-advisories/cve-2024-28094"
},
{
"url": "https://schoolbox.education/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Blind SQL Injection in Chat functionality in Schoolbox",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "07aac9b9-e3e9-4d03-a447-764bd31371d7",
"assignerShortName": "TML",
"cveId": "CVE-2024-28094",
"datePublished": "2024-03-07T03:14:25.843Z",
"dateReserved": "2024-03-04T04:27:20.021Z",
"dateUpdated": "2024-08-02T00:48:48.241Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Chat functionality in Schoolbox application before\\n version 23.1.3 is vulnerable to blind SQL Injection enabling the \\nauthenticated attackers to read, modify, and delete database records.\"}, {\"lang\": \"es\", \"value\": \"La funcionalidad de chat en la aplicaci\\u00f3n Schoolbox anterior a la versi\\u00f3n 23.1.3 es vulnerable a la inyecci\\u00f3n SQL ciega, lo que permite a los atacantes autenticados leer, modificar y eliminar registros de la base de datos.\"}]",
"id": "CVE-2024-28094",
"lastModified": "2024-11-21T09:05:48.043",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"vdp@themissinglink.com.au\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2024-03-07T04:15:07.333",
"references": "[{\"url\": \"https://schoolbox.education/\", \"source\": \"vdp@themissinglink.com.au\"}, {\"url\": \"https://www.themissinglink.com.au/security-advisories/cve-2024-28094\", \"source\": \"vdp@themissinglink.com.au\"}, {\"url\": \"https://schoolbox.education/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.themissinglink.com.au/security-advisories/cve-2024-28094\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "vdp@themissinglink.com.au",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"vdp@themissinglink.com.au\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-28094\",\"sourceIdentifier\":\"vdp@themissinglink.com.au\",\"published\":\"2024-03-07T04:15:07.333\",\"lastModified\":\"2025-02-05T17:15:25.047\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Chat functionality in Schoolbox application before\\n version 23.1.3 is vulnerable to blind SQL Injection enabling the \\nauthenticated attackers to read, modify, and delete database records.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad de chat en la aplicaci\u00f3n Schoolbox anterior a la versi\u00f3n 23.1.3 es vulnerable a la inyecci\u00f3n SQL ciega, lo que permite a los atacantes autenticados leer, modificar y eliminar registros de la base de datos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"vdp@themissinglink.com.au\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"vdp@themissinglink.com.au\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schoolbox:schoolbox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"23.1.3\",\"matchCriteriaId\":\"74EE0444-60C1-4AB1-9D79-4681443BFA26\"}]}]}],\"references\":[{\"url\":\"https://schoolbox.education/\",\"source\":\"vdp@themissinglink.com.au\",\"tags\":[\"Product\"]},{\"url\":\"https://www.themissinglink.com.au/security-advisories/cve-2024-28094\",\"source\":\"vdp@themissinglink.com.au\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://schoolbox.education/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://www.themissinglink.com.au/security-advisories/cve-2024-28094\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.themissinglink.com.au/security-advisories/cve-2024-28094\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://schoolbox.education/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:48:48.241Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-28094\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-07T18:31:38.565724Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:16.393Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"Blind SQL Injection in Chat functionality in Schoolbox\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-7\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-7 Blind SQL Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Schoolbox Pty Ltd\", \"product\": \"Schoolbox\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"23.1.3\", \"versionType\": \"Minor\"}], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2024-03-06T08:00:00.000Z\", \"references\": [{\"url\": \"https://www.themissinglink.com.au/security-advisories/cve-2024-28094\"}, {\"url\": \"https://schoolbox.education/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Chat functionality in Schoolbox application before\\n version 23.1.3 is vulnerable to blind SQL Injection enabling the \\nauthenticated attackers to read, modify, and delete database records.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Chat functionality in Schoolbox application before\\n version 23.1.3 is vulnerable to blind SQL Injection enabling the \\nauthenticated attackers to read, modify, and delete database records.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-89\", \"description\": \"CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"07aac9b9-e3e9-4d03-a447-764bd31371d7\", \"shortName\": \"TML\", \"dateUpdated\": \"2024-03-07T03:14:25.843Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-28094\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T00:48:48.241Z\", \"dateReserved\": \"2024-03-04T04:27:20.021Z\", \"assignerOrgId\": \"07aac9b9-e3e9-4d03-a447-764bd31371d7\", \"datePublished\": \"2024-03-07T03:14:25.843Z\", \"assignerShortName\": \"TML\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…