We are reliable, trustworthy, and ready for challenges! Hire Us
MISP – Time-based SQL injection in /Logs/index
- Home
- Advisories
- MISP – Time-based SQL injection in /Logs/index
DATE
13.09.2023
Affected Vendor
CIRCL – Computer Incident Response Center Luxembourg
Affected Product
MISP – Malware Information Sharing Platform & Open Standards For Threat Information Sharing – https://www.misp-project.org/
Vulnerable version
2.4.175
Fixed version
2.4.176
CVSS
Recommendations
Upgrade to the recent MISP version
Vulnerability details
A key of the request
POST body parameter in certain endpoints is inserted into an SQL query without proper escaping or validation. Authenticated adversaries can exploit this vulnerability by conducting time-based SQL injection attacks and get access to various information from the database including password hashes, API keys, and other.
CVE
CVE-2023-48657, CVE-2023-48658
Credits
Dawid Czarnecki
References
CVE-2023-48657:
- https://cvepremium.circl.lu/cve/CVE-2023-48657
- https://github.com/MISP/MISP/compare/v2.4.175…v2.4.176
- https://github.com/MISP/MISP/commit/08bd23281ead288de678de666ef43ed6de1899fc
CVE-2023-48658:
- https://cvepremium.circl.lu/cve/CVE-2023-48658
- https://github.com/MISP/MISP/compare/v2.4.175…v2.4.176
- https://github.com/MISP/MISP/commit/168621521b57b2437331174186f84a6aa3e71f0d
Do you think the security of your data might be lacking? Let's find the best approach together.
Once you contact us, we will ask you about the project you want to secure.