Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47911: n/a

0
Medium
VulnerabilityCVE-2024-47911cvecve-2024-47911
Published: Fri Oct 04 2024 (10/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In SonarSource SonarQube 10.4 through 10.5 before 10.6, a vulnerability was discovered in the authorizations/group-memberships API endpoint that allows SonarQube users with the administrator role to inject blind SQL commands.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:34:58 UTC

Technical Analysis

CVE-2024-47911 is a SQL injection vulnerability identified in the SonarSource SonarQube platform, specifically affecting versions 10.4 through 10.5 prior to 10.6. The flaw exists in the authorizations/group-memberships API endpoint, which is responsible for managing user group memberships and permissions. An attacker possessing administrator privileges can exploit this vulnerability by injecting blind SQL commands into the API requests. Blind SQL injection means the attacker can infer database information by observing application behavior or response times, even though direct query results are not returned. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating that user input is not properly sanitized before being incorporated into SQL queries. The CVSS v3.1 base score is 6.7, reflecting a medium severity level. The vector indicates low attack complexity, network attack vector, no user interaction required, and privileges required are high (administrator role). The impact includes high confidentiality and integrity loss, as attackers can extract or modify sensitive data within the SonarQube database. Availability impact is low. No public exploits have been reported yet, but the presence of administrator privileges as a prerequisite limits the attack surface to trusted users or compromised admin accounts. SonarQube is widely used in software development environments for continuous code quality and security analysis, making this vulnerability significant for organizations relying on it for secure development lifecycle processes.

Potential Impact

The vulnerability allows an attacker with administrator privileges to perform blind SQL injection attacks, potentially leading to unauthorized access to sensitive data, modification of database contents, or disruption of authorization mechanisms within SonarQube. This can compromise the integrity of code quality and security reports, mislead developers, and undermine trust in the development pipeline. Organizations using affected SonarQube versions risk exposure of confidential project data and user information stored in the platform. Since SonarQube is integral to many software development workflows, exploitation could indirectly affect software supply chain security. The requirement for administrator privileges reduces the likelihood of external attackers exploiting this vulnerability directly but raises concerns about insider threats or compromised admin accounts. The absence of known exploits in the wild suggests limited active exploitation currently, but the medium severity and potential impact warrant prompt remediation.

Mitigation Recommendations

Organizations should upgrade SonarQube installations to version 10.6 or later, where this vulnerability is fixed. Until upgrading is possible, restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Conduct regular audits of administrator accounts and monitor API usage logs for suspicious activity related to the authorizations/group-memberships endpoint. Implement network segmentation and access controls to limit exposure of the SonarQube server to only necessary internal networks. Review and harden database permissions to minimize potential damage from SQL injection attacks. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the affected API endpoint. Educate administrators on the risks of privilege misuse and ensure timely application of security patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d09b7ef31ef0b56d649

Added to database: 2/25/2026, 9:43:37 PM

Last enriched: 2/28/2026, 7:34:58 AM

Last updated: 4/12/2026, 9:12:24 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses