CVE-2024-38886
Caterease SQL Injection / Command Injection / Bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to perform a Traffic Injection attack due to improper verification of the source of a communication channel.
This is the official vulnerability disclosure report for CVEs CVE-2024-38881 through CVE-2024-38891 by jTag Labs. This report details critical security vulnerabilities found within Caterease, a product of Horizon Business Services Inc. These vulnerabilities have significant implications for the confidentiality, integrity, and availability of the software and the sensitive data it handles. The issues include problems like remote SQL injection, command injection, authentication bypass, hard-coded credentials, and more.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-06-21 CVE Reserved
- 2024-08-02 CVE Published
- 2024-08-12 CVE Updated
- 2024-12-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-940: Improper Verification of Source of a Communication Channel
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://caterease.com | ||
http://horizon.com | ||
https://vuldb.com/?id.273370 | ||
https://packetstormsecurity.com/files/179892/Caterease-Software-SQL-Injection-Command-Injection-Bypass.html |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Horizoncloud Search vendor "Horizoncloud" | Caterease Search vendor "Horizoncloud" for product "Caterease" | * | - |
Affected
|