
CVE-2024-24015
https://notcve.org/view.php?id=CVE-2024-24015
06 Feb 2024 — A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass in crafted offset, limit, and sort parameters to perform SQL via /sys/user/exit Existe una vulnerabilidad de inyección SQL en Novel-Plus v4.3.0-RC1 y versiones anteriores. Un atacante puede pasar parámetros de compensación, límite y clasificación manipulados para ejecutar SQL a través de /sys/user/exit • https://github.com/201206030/novel-plus • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-7171 – Novel-Plus Friendly Link FriendLinkController.java cross site scripting
https://notcve.org/view.php?id=CVE-2023-7171
29 Dec 2023 — A vulnerability was found in Novel-Plus up to 4.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java of the component Friendly Link Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. • https://github.com/201206030/novel-plus/commit/d6093d8182362422370d7eaf6c53afde9ee45215 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-7166 – Novel-Plus HTTP POST Request updateUserInfo cross site scripting
https://notcve.org/view.php?id=CVE-2023-7166
29 Dec 2023 — A vulnerability classified as problematic has been found in Novel-Plus up to 4.2.0. This affects an unknown part of the file /user/updateUserInfo of the component HTTP POST Request Handler. The manipulation of the argument nickName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/201206030/novel-plus/commit/c62da9bb3a9b3603014d0edb436146512631100d • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-28462
https://notcve.org/view.php?id=CVE-2022-28462
05 May 2022 — novel-plus 3.6.0 suffers from an Arbitrary file reading vulnerability. novel-plus versión 3.6.0, sufre una vulnerabilidad de lectura arbitraria de archivos • https://github.com/201206030/novel-plus/issues/85 • CWE-552: Files or Directories Accessible to External Parties •

CVE-2022-24568
https://notcve.org/view.php?id=CVE-2022-24568
10 Feb 2022 — Novel-plus v3.6.0 was discovered to be vulnerable to Server-Side Request Forgery (SSRF) via user-supplied crafted input. Se ha detectado que Novel-plus versión v3.6.0, es vulnerable a un ataque de tipo Server-Side Request Forgery (SSRF) por medio de una entrada diseñada por el usuario • https://github.com/201206030/novel-plus/issues/80 • CWE-918: Server-Side Request Forgery (SSRF) •