CVE-2024-57031
Published: 17 January 2025
Description
Adversaries may leverage databases to mine valuable information.
Security Summary
CVE-2024-57031, published on 2025-01-17, is a SQL injection vulnerability (CWE-89) affecting WeGIA versions prior to 3.2.0. The issue is located in the /funcionario/remuneracao.php component, where the id_funcionario parameter fails to properly sanitize user input, allowing malicious SQL payloads to be injected into backend database queries.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity. A remote, unauthenticated attacker requires only network access and can exploit it with low complexity and no user interaction. Successful exploitation enables arbitrary SQL execution, potentially resulting in high-impact compromise of confidentiality, integrity, and availability, such as unauthorized data access, modification, deletion, or denial of service against the database.
Advisories recommend upgrading to WeGIA 3.2.0 or later to mitigate the vulnerability. Further technical details and proof-of-concept information are available in the research repository at https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57031, with additional context on the official site at https://www.wegia.org/.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SQL injection vulnerability in a web application enables exploitation of public-facing applications (T1190) and direct access to databases for data collection (T1213.006).