Schedule demo
 
 

CVE-2024-5678

SQL injection in the 'Create monitor' function's REST API URL


Vulnerability Details
Severity Low
CVE ID CVE-2024-5678
Affected software versions Version 170900 and below
Fixed Version Version 16844 to 16849
Version 170002 to 170009
Version 171000 and above
Fixed On 6 May 2024

Details

A SQL injection vulnerability exists because a parameter does not validate input before executing the SQL query, leading to SQL injection. This occurs through the API, which can create a specific type of monitor.

Impact

This vulnerability can be exploited by users with ADMIN or DELEGATED ADMIN role privileges to add, modify, or delete data in the application's database.

Fix

Applications Manager version 171000 and above fixes this issue by implementing proper input validation.

Steps to update

Update your Applications Manager instance to the latest build using the service pack.

Source and Acknowledgements

Find out more about CVE-2024-5678 from the CVE Directory and NIST NVD.

Reported by:

Hòa Vũ Tiến

Need Help?

For clarification or corrections please contact our support team or email us at appmanager-support@manageengine.com

Loved by customers all over the world

"Standout Tool With Extensive Monitoring Capabilities"

It allows us to track crucial metrics such as response times, resource utilization, error rates, and transaction performance. The real-time monitoring alerts promptly notify us of any issues or anomalies, enabling us to take immediate action.

Reviewer Role: Research and Development

"I like Applications Manager because it helps us to detect issues present in our servers and SQL databases."
Carlos Rivero

Tech Support Manager, Lexmark

Trusted by over 6000+ businesses globally