
CVE-2024-24015
https://notcve.org/view.php?id=CVE-2024-24015
06 Feb 2024 — A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass in crafted offset, limit, and sort parameters to perform SQL via /sys/user/exit Existe una vulnerabilidad de inyección SQL en Novel-Plus v4.3.0-RC1 y versiones anteriores. Un atacante puede pasar parámetros de compensación, límite y clasificación manipulados para ejecutar SQL a través de /sys/user/exit • https://github.com/201206030/novel-plus • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-7171 – Novel-Plus Friendly Link FriendLinkController.java cross site scripting
https://notcve.org/view.php?id=CVE-2023-7171
29 Dec 2023 — A vulnerability was found in Novel-Plus up to 4.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java of the component Friendly Link Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. • https://github.com/201206030/novel-plus/commit/d6093d8182362422370d7eaf6c53afde9ee45215 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-7166 – Novel-Plus HTTP POST Request updateUserInfo cross site scripting
https://notcve.org/view.php?id=CVE-2023-7166
29 Dec 2023 — A vulnerability classified as problematic has been found in Novel-Plus up to 4.2.0. This affects an unknown part of the file /user/updateUserInfo of the component HTTP POST Request Handler. The manipulation of the argument nickName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/201206030/novel-plus/commit/c62da9bb3a9b3603014d0edb436146512631100d • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-35121
https://notcve.org/view.php?id=CVE-2022-35121
17 Aug 2022 — Novel-Plus v3.6.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /service/impl/BookServiceImpl.java. Se ha detectado que Novel-Plus versión v3.6.1, contiene una vulnerabilidad de inyección SQL por medio del parámetro keyword en el archivo/service/impl/BookServiceImpl.java. • https://github.com/201206030/novel-plus/issues/92 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2021-41921
https://notcve.org/view.php?id=CVE-2021-41921
28 Apr 2022 — novel-plus V3.6.1 allows unrestricted file uploads. Unrestricted file suffixes and contents can lead to server attacks and arbitrary code execution. novel-plus versión V3.6.1, permite una carga de archivos sin restricciones. Los sufijos y contenidos de los archivos sin restricciones pueden conllevar a ataques al servidor y una ejecución de código arbitrario • https://github.com/201206030/novel-plus/issues/62 • CWE-434: Unrestricted Upload of File with Dangerous Type •