Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51164: n/a

0
Critical
VulnerabilityCVE-2024-51164cvecve-2024-51164
Published: Fri Nov 15 2024 (11/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-51164 is a critical SQL injection vulnerability affecting JEPaaS version 7. 2. 8, specifically via the /je/login/btnLog/insertBtnLog endpoint. This flaw allows unauthenticated remote attackers to submit specially crafted queries that can retrieve all data stored in the underlying database. The vulnerability has a CVSS score of 9. 1, indicating high impact on confidentiality and availability without requiring authentication or user interaction. Exploitation could lead to significant data breaches and service disruptions. No known public exploits are reported yet, and no patches have been released. Organizations using JEPaaS 7. 2.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:23:24 UTC

Technical Analysis

CVE-2024-51164 is a critical SQL injection vulnerability identified in JEPaaS version 7.2.8, a platform used for enterprise process automation and application development. The vulnerability exists in the /je/login/btnLog/insertBtnLog endpoint, where multiple parameters are improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote attackers to craft queries that can bypass authentication and extract sensitive information from the backend database. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating a failure to properly validate or sanitize user input before incorporating it into SQL statements. The CVSS v3.1 score of 9.1 reflects the vulnerability's ease of exploitation (network vector, no privileges required, no user interaction) and its severe impact on confidentiality (full data disclosure) and availability (potential denial of service). Although no public exploits are currently known, the lack of patches and the critical nature of the flaw make it a high-priority risk. Attackers exploiting this vulnerability could gain unauthorized access to sensitive organizational data, including user credentials, business records, and configuration details, potentially leading to further compromise or data leakage.

Potential Impact

The impact of CVE-2024-51164 is severe for organizations using JEPaaS 7.2.8. Successful exploitation can result in complete data disclosure from the backend database, compromising confidentiality of sensitive information such as personal data, intellectual property, and operational details. Additionally, attackers could disrupt service availability by executing malicious queries that degrade or crash the database. This could lead to operational downtime, financial losses, regulatory penalties, and reputational damage. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely by any attacker with network access to the vulnerable endpoint, increasing the attack surface significantly. Organizations in sectors relying heavily on JEPaaS for critical business processes, including finance, healthcare, and government, face heightened risks of data breaches and service interruptions.

Mitigation Recommendations

To mitigate CVE-2024-51164, organizations should immediately implement the following measures: 1) Apply any available patches or updates from the JEPaaS vendor as soon as they are released. 2) If patches are not yet available, restrict network access to the /je/login/btnLog/insertBtnLog endpoint using firewalls or web application firewalls (WAFs) with rules designed to detect and block SQL injection attempts. 3) Conduct thorough input validation and sanitization on all parameters accepted by the vulnerable endpoint, employing parameterized queries or prepared statements to prevent injection. 4) Monitor logs for suspicious query patterns or repeated failed attempts targeting the endpoint. 5) Employ database activity monitoring tools to detect anomalous queries indicative of exploitation attempts. 6) Review and limit database user privileges to minimize potential damage from a successful injection. 7) Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases. 8) Consider deploying runtime application self-protection (RASP) solutions to provide additional real-time protection against injection attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bacb7ef31ef0b558882

Added to database: 2/25/2026, 9:37:48 PM

Last enriched: 2/26/2026, 1:23:24 AM

Last updated: 2/26/2026, 9:48:11 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats