SQLi in Magarsus Consultancy's SSO
翻译中…平台
other
组件
sso-single-sign-on
修复版本
1.1
CVE-2024-4228 describes a critical SQL Injection vulnerability discovered in Magarsus Consultancy SSO. This flaw allows attackers to potentially extract sensitive information from the database. The vulnerability affects versions 1.0 through 1.1 of the SSO software. A patch is available in version 1.1.
影响与攻击场景翻译中…
The SQL Injection vulnerability in Magarsus Consultancy SSO poses a significant risk to organizations using this software. An attacker could exploit this flaw to bypass authentication mechanisms and gain unauthorized access to the underlying database. This could lead to the exfiltration of sensitive data, including user credentials, configuration details, and potentially other confidential information. Successful exploitation could also allow for modification or deletion of data within the database, leading to disruption of services and potential data loss. The impact is particularly severe given the critical CVSS score of 9.8, indicating a high likelihood of exploitation and significant potential damage.
利用背景翻译中…
CVE-2024-4228 was publicly disclosed on 2024-06-26. As of this date, there are no publicly known proof-of-concept exploits available. The vulnerability is listed on the NVD and CISA advisories. The EPSS score is likely to be assessed as medium to high due to the critical CVSS score and the potential for significant data exfiltration.
哪些人处于风险中翻译中…
Organizations utilizing Magarsus Consultancy SSO versions 1.0 and 1.1, particularly those with sensitive data stored in the SSO database, are at significant risk. Shared hosting environments where multiple users share the same SSO instance are also particularly vulnerable.
攻击时间线
- Disclosure
disclosure
威胁情报
漏洞利用状态
EPSS
0.21% (43% 百分位)
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 无 — 无需认证,无需凭证即可利用。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 未改变 — 影响仅限于脆弱组件本身。
- Confidentiality
- 高 — 完全丧失机密性,攻击者可读取所有数据。
- Integrity
- 高 — 攻击者可写入、修改或删除任何数据。
- Availability
- 高 — 完全崩溃或资源耗尽,完全拒绝服务。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2024-4228 is to immediately upgrade to version 1.1 of Magarsus Consultancy SSO, which contains the fix. If upgrading is not immediately feasible, consider implementing temporary workarounds such as input validation and parameterized queries to reduce the attack surface. While not a complete solution, these measures can help to prevent exploitation. Review and restrict database user permissions to limit the potential impact of a successful attack. After upgrading, confirm the vulnerability is resolved by attempting a SQL injection attack on the affected endpoints and verifying that the input is properly sanitized.
修复方法翻译中…
Actualice Magarsus Consultancy SSO a la versión 1.1 o posterior. Esta versión contiene la corrección para la vulnerabilidad de inyección SQL. Consulte el aviso de seguridad del proveedor para obtener más detalles sobre la actualización.
CVE 安全通讯
漏洞分析和关键警报直接发送到您的邮箱。
常见问题翻译中…
What is CVE-2024-4228 — SQL Injection in Magarsus Consultancy SSO?
CVE-2024-4228 is a critical SQL Injection vulnerability affecting Magarsus Consultancy SSO versions 1.0 through 1.1, allowing attackers to potentially extract sensitive data.
Am I affected by CVE-2024-4228 in Magarsus Consultancy SSO?
If you are using Magarsus Consultancy SSO version 1.0 or 1.1, you are affected by this vulnerability and should upgrade immediately.
How do I fix CVE-2024-4228 in Magarsus Consultancy SSO?
The recommended fix is to upgrade to version 1.1 of Magarsus Consultancy SSO. Implement temporary workarounds like input validation if immediate upgrade is not possible.
Is CVE-2024-4228 being actively exploited?
As of the current date, there are no publicly known active exploitation campaigns, but the critical severity warrants immediate attention and remediation.
Where can I find the official Magarsus Consultancy advisory for CVE-2024-4228?
Refer to the Magarsus Consultancy website and relevant security advisories for the official advisory regarding CVE-2024-4228.