diff --git a/http/cves/2024/CVE-2024-32737.yaml b/http/cves/2024/CVE-2024-32737.yaml new file mode 100644 index 0000000000..ff61f6d69e --- /dev/null +++ b/http/cves/2024/CVE-2024-32737.yaml @@ -0,0 +1,55 @@ +id: CVE-2024-32737 + +info: + name: CyberPower - SQL Injection + author: DhiyaneshDk + severity: high + description: | + A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. + impact: | + An unauthenticated remote attacker can leak sensitive information via the "query_contract_result" function within MCUDBHelper. + reference: + - https://www.cyberpower.com/global/en/File/GetFileSampleByType?fileId=SU-18070002-07&fileSubType=FileReleaseNote + - https://www.tenable.com/security/research/tra-2024-14 + - https://nvd.nist.gov/vuln/detail/CVE-2024-32737 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2024-32737 + cwe-id: CWE-89 + epss-score: 0.00043 + epss-percentile: 0.09691 + metadata: + verified: true + max-request: 1 + shodan-query: html:"