CRITICALCVE-2024-12150CVSS 9.8

SQLi in Eron Software's Wowwo CRM

翻译中…

平台

php

组件

wowwo-crm

修复版本

1.0.1

AI Confidence: mediumNVDEPSS 0.1%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2024-12150 describes a critical SQL Injection vulnerability affecting Wowwo CRM. This flaw allows attackers to perform Blind SQL Injection, potentially leading to unauthorized data access and manipulation within the CRM system. The vulnerability impacts versions 0–0 of Wowwo CRM. A fix is available in version 0.0.1, but vendor confirmation of the fix is pending.

影响与攻击场景翻译中…

The SQL Injection vulnerability in Wowwo CRM (CVE-2024-12150) poses a significant risk to data confidentiality and integrity. An attacker exploiting this flaw can bypass authentication mechanisms and directly query the database, potentially extracting sensitive customer data, financial records, and internal system configurations. The 'Blind SQL Injection' nature of the vulnerability means the attacker doesn't receive direct feedback from the database, requiring them to infer information through trial and error, but the potential impact remains severe. Successful exploitation could lead to complete compromise of the CRM system and associated data.

利用背景翻译中…

CVE-2024-12150 is currently not listed on the CISA KEV catalog. The EPSS score is likely to be medium or high given the CRITICAL CVSS score and the potential for Blind SQL Injection. Public proof-of-concept exploits are not currently known, but the vulnerability's nature makes it a likely target for exploitation. The vulnerability was published on 2025-06-27.

哪些人处于风险中翻译中…

Organizations that rely on Wowwo CRM for customer relationship management and store sensitive data are at significant risk. This includes businesses of all sizes, particularly those using older, unpatched versions of the CRM. Shared hosting environments where multiple customers share the same server instance are also at increased risk, as a compromise of one customer's CRM instance could potentially impact others.

检测步骤翻译中…

• php: Examine web server access logs for unusual SQL query patterns or error messages related to SQL syntax. Look for requests containing potentially malicious SQL code in GET or POST parameters.

grep -i 'sqlinjection|mysql_query' /var/log/apache2/access.log

• generic web: Use curl to test vulnerable endpoints with SQL injection payloads. Monitor the response for any signs of error messages or data leakage.

curl -X POST -d "username=' OR '1'='1" http://wowwo-crm/login.php

• database (mysql): Monitor MySQL logs for suspicious query patterns or error messages related to SQL syntax. Check for unauthorized access attempts to sensitive tables.

SELECT * FROM mysql.user WHERE user = 'attacker';

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.06% (19% 百分位)

CISA SSVC

利用情况none
可自动化yes
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件wowwo-crm
供应商Eron Software
影响范围修复版本
0.0.0 – 1.0.01.0.1

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. 修改日期
  4. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2024-12150 is to immediately upgrade Wowwo CRM to version 0.0.1. If upgrading is not immediately feasible due to compatibility issues or downtime concerns, consider implementing a Web Application Firewall (WAF) with rules designed to detect and block SQL Injection attempts targeting the vulnerable endpoints. Carefully review and sanitize all user inputs to prevent malicious SQL code from being injected into database queries. Monitor database logs for suspicious activity, such as unusual query patterns or error messages related to SQL syntax. The vendor has not confirmed the fix, so thorough testing is essential after upgrading.

修复方法翻译中…

Actualice Wowwo CRM a la última versión disponible proporcionada por el proveedor, una vez que se publique una versión corregida. Consulte el sitio web del proveedor para obtener actualizaciones e instrucciones específicas sobre cómo aplicar el parche o la actualización.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2024-12150 — SQL Injection in Wowwo CRM?

CVE-2024-12150 is a critical SQL Injection vulnerability in Wowwo CRM allowing Blind SQL Injection, potentially leading to unauthorized data access. It impacts versions 0–0.

Am I affected by CVE-2024-12150 in Wowwo CRM?

If you are using Wowwo CRM version 0–0, you are potentially affected by this vulnerability. Upgrade to version 0.0.1 as soon as possible.

How do I fix CVE-2024-12150 in Wowwo CRM?

The recommended fix is to upgrade to version 0.0.1 of Wowwo CRM. If upgrading is not immediately possible, implement WAF rules and sanitize user inputs.

Is CVE-2024-12150 being actively exploited?

While no active exploitation has been confirmed, the vulnerability's nature makes it a likely target. Monitor your systems closely for suspicious activity.

Where can I find the official Wowwo CRM advisory for CVE-2024-12150?

Please refer to the vendor's official website or security advisory channels for the latest information regarding CVE-2024-12150.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。