CRITICALCVE-2024-8466CVSS 9.8

SQL injection vulnerability in Job Portal

翻译中…

平台

php

组件

job-portal

修复版本

1.0.1

AI Confidence: highNVDEPSS 0.1%已审阅: 2026年5月
正在翻译为您的语言…

A critical SQL injection vulnerability exists in Job Portal versions 1.0 through 1.0. This flaw allows an attacker to inject malicious SQL queries through the CATEGORY parameter within the /jobportal/admin/category/controller.php file, potentially leading to unauthorized data retrieval. The vulnerability has been resolved in version 1.0.1, and users are strongly advised to upgrade immediately.

影响与攻击场景翻译中…

The impact of this SQL injection vulnerability is severe. An attacker can leverage it to extract sensitive data stored within the Job Portal database. This could include user credentials, personal information, financial details, or any other data the application stores. Successful exploitation could lead to complete database compromise, allowing the attacker to modify or delete data, gain administrative access, or even execute arbitrary code on the server. The blast radius extends to all users of the Job Portal application and any systems connected to the database.

利用背景翻译中…

CVE-2024-8466 was publicly disclosed on September 5, 2024. As of this writing, there are no publicly available proof-of-concept exploits. The vulnerability's critical CVSS score suggests a high probability of exploitation if left unpatched. It is not currently listed on the CISA KEV catalog.

哪些人处于风险中翻译中…

Organizations utilizing Job Portal for recruitment and applicant tracking are at significant risk. This includes businesses of all sizes, particularly those relying on the application for sensitive candidate data. Shared hosting environments where multiple applications share the same database are also at increased risk, as a compromise of one application could potentially expose data from others.

检测步骤翻译中…

• php / server:

grep -r "SELECT.*FROM" /var/www/jobportal/

• generic web:

curl -X POST -d "CATEGORY='; DROP TABLE users;--" http://your-jobportal-url/jobportal/admin/category/controller.php | grep "ERROR"

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.12% (31% 百分位)

CISA SSVC

利用情况none
可自动化no
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件job-portal
供应商PHPGurukul
影响范围修复版本
1.0 – 1.01.0.1

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2024-8466 is to upgrade to Job Portal version 1.0.1 or later, which contains the necessary fix. If immediate upgrading is not possible, consider implementing a Web Application Firewall (WAF) rule to filter out potentially malicious SQL queries targeting the CATEGORY parameter. Input validation and sanitization on the server-side can also help reduce the attack surface. Thoroughly review and update any existing database access controls to limit the potential damage from a successful attack. After upgrading, confirm the vulnerability is resolved by attempting a SQL injection payload through the CATEGORY parameter and verifying that it is properly sanitized.

修复方法翻译中…

Actualizar a una versión parcheada del Job Portal proporcionada por PHPGurukul. Si no hay una versión parcheada disponible, revisar y sanear todas las entradas del parámetro CATEGORY en el archivo /jobportal/admin/category/controller.php para evitar la inyección SQL. Implementar validación y escape de datos antes de ejecutar consultas SQL.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2024-8466 — SQL Injection in Job Portal?

CVE-2024-8466 is a critical SQL injection vulnerability affecting Job Portal versions 1.0–1.0. An attacker can exploit this flaw to retrieve data from the database using a crafted query.

Am I affected by CVE-2024-8466 in Job Portal?

If you are using Job Portal version 1.0, you are vulnerable. Upgrade to version 1.0.1 or later to resolve the issue.

How do I fix CVE-2024-8466 in Job Portal?

The recommended fix is to upgrade to Job Portal version 1.0.1 or later. As a temporary workaround, implement a WAF rule to filter malicious SQL queries.

Is CVE-2024-8466 being actively exploited?

As of the current date, there are no confirmed reports of active exploitation, but the critical severity warrants immediate attention and patching.

Where can I find the official Job Portal advisory for CVE-2024-8466?

Refer to the official Job Portal website or security announcements for the latest advisory regarding CVE-2024-8466.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。