Executive summaryA SQL injection vulnerability was identified: user inputs are not properly validated or parameterized, allowing query manipulation, unauthorized database access or modification, and potentially command execution.
Description
A SQL injection vulnerability has been identified within the application. User inputs are incorporated into SQL queries without proper validation or parameterization, allowing an attacker to alter their logic.
This flaw can be exploited to perform unauthorized actions on the database (reading, modifying, or deleting data) and, in some cases, may lead to command execution on the underlying system.
Limited technical details disclosed
No additional technical details are being disclosed at this stage in order to reduce the potential impact these vulnerabilities could have on self-hosted instances.
For the moment, this will remain the case until we receive approval from ANSSI.
This article is not an exploitation tutorial, and I disclaim all responsibility for any malicious use or damage resulting from the information provided.
Attack Vectors
Network access: Fully remote, no authentication required