CVE-2024-2478
NixOS vulnerability analysis and mitigation

Overview

A critical SQL injection vulnerability (CVE-2024-2478) was discovered in BradWenqiang HR 2.0, specifically affecting the selectAll function in the Background Management component's /bishe/register file. The vulnerability was disclosed on March 15, 2024, and allows manipulation of the userName parameter to execute SQL injection attacks (VulDB, NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue is classified as CWE-89 (SQL Injection) and involves improper neutralization of special elements in SQL commands. The vulnerability exists in the selectAll() method, which is called through the userName parameter and propagates through multiple layers including the service layer and mapper layer before executing the SQL statement (NVD).

Impact

The SQL injection vulnerability allows remote attackers to potentially access, modify, or delete database contents, compromising the confidentiality, integrity, and availability of the system. The attack can be launched remotely, and the exploit has been publicly disclosed (VulDB).

Mitigation and workarounds

The vendor was contacted early about this disclosure but did not respond or provide any official patches. No specific mitigation strategies have been published at this time (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management