
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical SQL injection vulnerability (CVE-2023-24782) was discovered in funadmin/funadmin versions up to 3.2.0. The vulnerability exists in the database management plugin, specifically in the edit method of the app\databases\controller\Database.php file. The issue stems from improper handling of the 'id' parameter in database operations (GitHub Issue, FortiGuard).
The vulnerability occurs when the application directly retrieves and concatenates the 'id' parameter into SQL statements without proper sanitization. This occurs specifically in the database management plugin's edit functionality. The vulnerability can be exploited through the /databases/database/edit endpoint by manipulating the 'id' parameter (GitHub Issue).
A successful exploitation of this vulnerability could allow an attacker with administrator access to perform SQL injection attacks, potentially leading to unauthorized database access, data manipulation, or exposure of sensitive information (FortiGuard).
Users are advised to upgrade to a version newer than 3.2.0 which contains fixes for this vulnerability (FortiGuard).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."