Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42565: n/a

0
Critical
VulnerabilityCVE-2024-42565cvecve-2024-42565
Published: Tue Aug 20 2024 (08/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-42565 is a critical SQL injection vulnerability found in an ERP system, exploitable via the 'id' parameter at the /index. php/basedata/contact/delete? action=delete endpoint. It allows unauthenticated remote attackers to execute arbitrary SQL commands, potentially leading to full compromise of the affected system's confidentiality, integrity, and availability. The vulnerability has a CVSS score of 9. 8, indicating a severe risk with no user interaction or privileges required. Although no known exploits are currently reported in the wild, the ease of exploitation and impact make it a high-priority issue. Organizations using this ERP system should urgently assess exposure and apply mitigations to prevent data breaches and system disruption.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:20:29 UTC

Technical Analysis

CVE-2024-42565 is a critical SQL injection vulnerability identified in an ERP software product. The flaw exists in the handling of the 'id' parameter within the URL path /index.php/basedata/contact/delete?action=delete. This parameter is improperly sanitized, allowing attackers to inject malicious SQL queries directly into the backend database. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation can lead to unauthorized data access, modification, or deletion, and potentially full system compromise depending on database privileges. The CVSS 3.1 base score of 9.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges. The vulnerability is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and dangerous class of injection flaws. No patches or fixes have been linked yet, and no public exploits have been reported, but the critical nature demands immediate attention from affected organizations.

Potential Impact

The impact of CVE-2024-42565 is severe for organizations using the affected ERP system. Exploitation can lead to unauthorized disclosure of sensitive business data, alteration or deletion of critical records, and disruption of business operations. Attackers could leverage this vulnerability to escalate privileges, move laterally within the network, or deploy ransomware or other malware payloads. The loss of data integrity and availability could result in significant financial losses, regulatory penalties, and reputational damage. Given the ERP system's central role in managing enterprise resources, the vulnerability poses a systemic risk that could affect supply chains, customer data, and internal processes globally.

Mitigation Recommendations

To mitigate CVE-2024-42565, organizations should immediately conduct a thorough security review of the affected ERP system, focusing on the /index.php/basedata/contact/delete?action=delete endpoint. Specific recommendations include: 1) Implement parameterized queries or prepared statements to eliminate SQL injection risks; 2) Employ rigorous input validation and sanitization for all user-supplied data, especially URL parameters; 3) Restrict database user privileges to the minimum necessary to limit potential damage; 4) Monitor logs for suspicious SQL errors or unusual query patterns indicative of injection attempts; 5) Apply web application firewalls (WAFs) with rules targeting SQL injection signatures; 6) Segregate the ERP system network segment to reduce exposure; 7) Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available; 8) Conduct penetration testing to verify the effectiveness of mitigations; 9) Educate development teams on secure coding practices to prevent similar issues in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc3b7ef31ef0b568e18

Added to database: 2/25/2026, 9:42:27 PM

Last enriched: 2/26/2026, 7:20:29 AM

Last updated: 2/26/2026, 9:34:32 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats