CVE-2024-50584: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Image Access GmbH Scan2Net
An authenticated attacker with the user/role "Poweruser" can perform an SQL injection by accessing the /class/template_io.php file and supplying malicious GET parameters. The "templates" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter.
AI Analysis
Technical Summary
CVE-2024-50584 is an SQL injection vulnerability classified under CWE-89, discovered in Image Access GmbH's Scan2Net product. The flaw exists in the /class/template_io.php file, specifically in the handling of the 'templates' GET parameter, which is vulnerable to blind boolean-based SQL injection attacks. An attacker with authenticated access and the 'Poweruser' role can inject SQL syntax into the JSON structure of the 'templates' parameter, enabling them to manipulate backend database queries. This injection is blind and boolean-based, meaning the attacker can infer data by observing true/false responses without direct data output. The vulnerability requires low attack complexity and privileges but no user interaction. The CVSS v3.1 base score is 4.4, reflecting limited confidentiality and integrity impact and no availability impact. No patches or known exploits have been reported yet. The vulnerability could allow attackers to extract sensitive information or alter data stored in the Scan2Net device's database, potentially compromising device integrity and confidentiality of stored information.
Potential Impact
For European organizations, the impact primarily concerns confidentiality and integrity of data managed by Scan2Net devices. Attackers with Poweruser credentials could extract sensitive configuration or user data or modify stored information, potentially disrupting workflows or exposing sensitive scanning data. While availability is not affected, unauthorized data manipulation could undermine trust in document management processes. Organizations in sectors relying on Scan2Net for document scanning and archiving—such as government agencies, legal firms, and healthcare providers—may face compliance and privacy risks if exploited. The requirement for authenticated access limits remote exploitation but insider threats or compromised credentials could enable attacks. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation.
Mitigation Recommendations
Since no official patch is currently available, organizations should implement compensating controls. These include restricting 'Poweruser' role assignments to trusted personnel only and enforcing strong authentication mechanisms to reduce risk of credential compromise. Network segmentation should isolate Scan2Net devices from untrusted networks to limit attacker access. Monitoring and logging of access to the /class/template_io.php endpoint and unusual query patterns can help detect exploitation attempts. If possible, disable or restrict access to the vulnerable endpoint or parameters. Regularly review and update device firmware and software to apply patches once released by Image Access GmbH. Additionally, conduct security awareness training for users with elevated privileges to recognize and report suspicious activity.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium
CVE-2024-50584: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Image Access GmbH Scan2Net
Description
An authenticated attacker with the user/role "Poweruser" can perform an SQL injection by accessing the /class/template_io.php file and supplying malicious GET parameters. The "templates" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter.
AI-Powered Analysis
Technical Analysis
CVE-2024-50584 is an SQL injection vulnerability classified under CWE-89, discovered in Image Access GmbH's Scan2Net product. The flaw exists in the /class/template_io.php file, specifically in the handling of the 'templates' GET parameter, which is vulnerable to blind boolean-based SQL injection attacks. An attacker with authenticated access and the 'Poweruser' role can inject SQL syntax into the JSON structure of the 'templates' parameter, enabling them to manipulate backend database queries. This injection is blind and boolean-based, meaning the attacker can infer data by observing true/false responses without direct data output. The vulnerability requires low attack complexity and privileges but no user interaction. The CVSS v3.1 base score is 4.4, reflecting limited confidentiality and integrity impact and no availability impact. No patches or known exploits have been reported yet. The vulnerability could allow attackers to extract sensitive information or alter data stored in the Scan2Net device's database, potentially compromising device integrity and confidentiality of stored information.
Potential Impact
For European organizations, the impact primarily concerns confidentiality and integrity of data managed by Scan2Net devices. Attackers with Poweruser credentials could extract sensitive configuration or user data or modify stored information, potentially disrupting workflows or exposing sensitive scanning data. While availability is not affected, unauthorized data manipulation could undermine trust in document management processes. Organizations in sectors relying on Scan2Net for document scanning and archiving—such as government agencies, legal firms, and healthcare providers—may face compliance and privacy risks if exploited. The requirement for authenticated access limits remote exploitation but insider threats or compromised credentials could enable attacks. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation.
Mitigation Recommendations
Since no official patch is currently available, organizations should implement compensating controls. These include restricting 'Poweruser' role assignments to trusted personnel only and enforcing strong authentication mechanisms to reduce risk of credential compromise. Network segmentation should isolate Scan2Net devices from untrusted networks to limit attacker access. Monitoring and logging of access to the /class/template_io.php endpoint and unusual query patterns can help detect exploitation attempts. If possible, disable or restrict access to the vulnerable endpoint or parameters. Regularly review and update device firmware and software to apply patches once released by Image Access GmbH. Additionally, conduct security awareness training for users with elevated privileges to recognize and report suspicious activity.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2024-10-25T07:26:12.627Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092eea35043901e82cab18
Added to database: 11/3/2025, 10:38:34 PM
Last enriched: 11/3/2025, 11:37:34 PM
Last updated: 12/19/2025, 2:58:04 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67846: CWE-472 External Control of Assumed-Immutable Web Parameter in Mintlify Mintlify Platform
MediumCVE-2025-67845: CWE-24 Path Traversal: '../filedir' in Mintlify Mintlify Platform
MediumCVE-2025-67844: CWE-425 Direct Request ('Forced Browsing') in Mintlify Mintlify Platform
MediumCVE-2025-67843: CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine in Mintlify Mintlify Platform
HighCVE-2025-67842: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in Mintlify Mintlify Platform
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.