Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33122: n/a

0
Medium
VulnerabilityCVE-2024-33122cvecve-2024-33122
Published: Tue May 07 2024 (05/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Roothub v2.6 was discovered to contain a SQL injection vulnerability via the topic parameter in the list() function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:44:09 UTC

Technical Analysis

CVE-2024-33122 identifies a SQL injection vulnerability in Roothub version 2.6, specifically through the topic parameter in the list() function. SQL injection (CWE-89) vulnerabilities occur when user-supplied input is improperly sanitized and directly incorporated into SQL queries, allowing attackers to manipulate the backend database. In this case, the topic parameter is vulnerable, enabling an attacker with low privileges (PR:L) to execute arbitrary SQL commands remotely (AV:N) without requiring user interaction (UI:N). The vulnerability affects the confidentiality, integrity, and availability of the database, but the impact is limited (C:L/I:L/A:L) as per the CVSS 3.1 score of 6.3 (medium severity). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other components. No patches or known exploits are currently available, indicating that exploitation in the wild has not been observed yet. However, the presence of this vulnerability in a network-accessible function poses a risk of unauthorized data access, data modification, or denial of service through crafted SQL payloads. Organizations using Roothub v2.6 should conduct thorough code audits, implement input validation, and consider temporary mitigations such as web application firewalls to detect and block malicious SQL injection attempts until an official patch is released.

Potential Impact

The SQL injection vulnerability in Roothub v2.6 can lead to unauthorized access to sensitive data, data corruption, or denial of service conditions. Attackers exploiting this flaw could extract confidential information from the database, modify or delete data, or disrupt application availability. Although the CVSS score indicates medium severity, the impact depends on the database's role and the sensitivity of stored data. Since exploitation requires low privileges but no user interaction, attackers with some access to the system or network could leverage this vulnerability to escalate their privileges or move laterally within an organization’s infrastructure. This could result in data breaches, loss of data integrity, and operational disruptions, potentially affecting business continuity and compliance with data protection regulations. The absence of known exploits reduces immediate risk, but the vulnerability remains a significant concern for organizations relying on Roothub v2.6 in critical environments.

Mitigation Recommendations

To mitigate CVE-2024-33122, organizations should first perform a comprehensive review of the Roothub source code focusing on the list() function and the handling of the topic parameter. Implement strict input validation and sanitization to ensure that user inputs cannot alter SQL query structure. Employ parameterized queries or prepared statements to prevent SQL injection attacks effectively. Until an official patch is released, deploy Web Application Firewalls (WAFs) with rules tailored to detect and block SQL injection payloads targeting the topic parameter. Limit user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. Monitor application logs and network traffic for unusual query patterns or error messages indicative of SQL injection attempts. Additionally, consider isolating the Roothub application in a segmented network environment to contain potential breaches. Stay updated with vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c39b7ef31ef0b56154e

Added to database: 2/25/2026, 9:40:09 PM

Last enriched: 2/28/2026, 2:44:09 AM

Last updated: 4/12/2026, 3:38:10 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses