![]() |
|
Message-ID: <3d9ec56c-8dd4-f87f-da34-d07e5934771a@apache.org> Date: Mon, 24 Mar 2025 17:23:50 +0000 From: Josh Thompson <jfthomps@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-53678: Apache VCL: SQL injection vulnerability in New Block Allocation form Affected versions: - Apache VCL 2.2 through 2.5.1 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache VCL. Users can modify form data submitted when requesting a new Block Allocation such that a SELECT SQL statement is modified. The data returned by the SELECT statement is not viewable by the attacker. This issue affects all versions of Apache VCL from 2.2 through 2.5.1. Users are recommended to upgrade to version 2.5.2, which fixes the issue. Credit: Chiencp and Nothing from TeamTonTac (finder) References: https://vcl.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-53678
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.