Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50584: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Image Access GmbH Scan2Net

0
Medium
VulnerabilityCVE-2024-50584cvecve-2024-50584cwe-89
Published: Thu Dec 12 2024 (12/12/2024, 13:39:33 UTC)
Source: CVE Database V5
Vendor/Project: Image Access GmbH
Product: Scan2Net

Description

An authenticated attacker with the user/role "Poweruser" can perform an SQL injection by accessing the /class/template_io.php file and supplying malicious GET parameters. The "templates" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:37:34 UTC

Technical Analysis

CVE-2024-50584 is an SQL injection vulnerability classified under CWE-89, discovered in Image Access GmbH's Scan2Net product. The flaw exists in the /class/template_io.php file, specifically in the handling of the 'templates' GET parameter, which is vulnerable to blind boolean-based SQL injection attacks. An attacker with authenticated access and the 'Poweruser' role can inject SQL syntax into the JSON structure of the 'templates' parameter, enabling them to manipulate backend database queries. This injection is blind and boolean-based, meaning the attacker can infer data by observing true/false responses without direct data output. The vulnerability requires low attack complexity and privileges but no user interaction. The CVSS v3.1 base score is 4.4, reflecting limited confidentiality and integrity impact and no availability impact. No patches or known exploits have been reported yet. The vulnerability could allow attackers to extract sensitive information or alter data stored in the Scan2Net device's database, potentially compromising device integrity and confidentiality of stored information.

Potential Impact

For European organizations, the impact primarily concerns confidentiality and integrity of data managed by Scan2Net devices. Attackers with Poweruser credentials could extract sensitive configuration or user data or modify stored information, potentially disrupting workflows or exposing sensitive scanning data. While availability is not affected, unauthorized data manipulation could undermine trust in document management processes. Organizations in sectors relying on Scan2Net for document scanning and archiving—such as government agencies, legal firms, and healthcare providers—may face compliance and privacy risks if exploited. The requirement for authenticated access limits remote exploitation but insider threats or compromised credentials could enable attacks. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation.

Mitigation Recommendations

Since no official patch is currently available, organizations should implement compensating controls. These include restricting 'Poweruser' role assignments to trusted personnel only and enforcing strong authentication mechanisms to reduce risk of credential compromise. Network segmentation should isolate Scan2Net devices from untrusted networks to limit attacker access. Monitoring and logging of access to the /class/template_io.php endpoint and unusual query patterns can help detect exploitation attempts. If possible, disable or restrict access to the vulnerable endpoint or parameters. Regularly review and update device firmware and software to apply patches once released by Image Access GmbH. Additionally, conduct security awareness training for users with elevated privileges to recognize and report suspicious activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2024-10-25T07:26:12.627Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092eea35043901e82cab18

Added to database: 11/3/2025, 10:38:34 PM

Last enriched: 11/3/2025, 11:37:34 PM

Last updated: 12/19/2025, 2:58:04 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats