CVE-2018-15918

MEDIUM

Jorani - SQL Injection

Title source: rule
STIX 2.1

Description

An issue was discovered in Jorani 0.6.5. SQL Injection (error-based) allows a user of the application without permissions to read and modify sensitive information from the database used by the application via the startdate or enddate parameter to leaves/validate.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Javier Olmedo · textwebappsphp
https://www.exploit-db.com/exploits/45340

References (3)

Core 3
Core References
Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/45340/
Issue Tracking, Vendor Advisory x_refsource_misc
https://github.com/bbalet/jorani/issues/254

Scores

CVSS v3 5.4
EPSS 0.0022
EPSS Percentile 44.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Details

CWE
CWE-89
Status published
Products (1)
jorani_project/jorani 0.6.5
Published Sep 05, 2018
Tracked Since Feb 18, 2026