CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-48733

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.01002/1

CVE-2024-48733 is a reported SQL injection vulnerability in SAS Studio 9.4. It potentially allows a remote attacker to execute arbitrary SQL commands via a crafted POST request to the /SASStudio/sasexec/sessions/{sessionID}/sql endpoint. However, the vendor disputes this, stating that authorized users are permitted to execute SQL statements.

With a SOCRadar Vulnerability Risk Score (SVRS) of 30, CVE-2024-48733 is currently considered a low-risk vulnerability. Despite the low SVRS, organizations using SAS Studio 9.4 should carefully review access controls and authentication mechanisms to ensure only authorized users can execute SQL commands. Even though the vendor disputes the severity, the existence of a potential SQL injection point warrants monitoring and possibly further investigation. The risk associated with this vulnerability primarily involves potential data breaches or unauthorized data manipulation, but the low SVRS suggests this is unlikely. The vendor's dispute highlights the importance of confirming vulnerabilities before taking drastic remediation steps.

In The Wild
2024-10-30

2024-11-04
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-48733 is an SQL injection vulnerability in SAS Studio 9.4 that allows a remote attacker to execute arbitrary SQL commands. This vulnerability has a low CVSS score of 0, but a higher SOCRadar Vulnerability Risk Score (SVRS) of 30, indicating a moderate level of risk.

Key Insights

  • Exploitation in the Wild: This vulnerability is actively exploited by hackers, making it a critical threat.
  • Vendor Dispute: The vendor disputes the severity of this vulnerability, claiming that SQL statement execution is allowed for authorized users. However, the SVRS score suggests that this vulnerability should be taken seriously.
  • Remote Attack Vector: This vulnerability can be exploited remotely, making it easier for attackers to target systems.
  • SQL Injection: SQL injection vulnerabilities allow attackers to execute arbitrary SQL commands, which can lead to data theft, database manipulation, and other malicious activities.

Mitigation Strategies

  • Apply Software Updates: Install the latest security updates from SAS to patch this vulnerability.
  • Use Input Validation: Implement input validation techniques to prevent attackers from submitting malicious SQL commands.
  • Limit User Privileges: Restrict user privileges to the minimum necessary to perform their tasks, reducing the impact of potential attacks.
  • Monitor Network Traffic: Monitor network traffic for suspicious activity that may indicate an SQL injection attack.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-48733 | SAS Studio 9.4 POST Body sql sql injection
vuldb.com2024-10-31
CVE-2024-48733 | SAS Studio 9.4 POST Body sql sql injection | A vulnerability was found in SAS Studio 9.4. It has been classified as critical. This affects an unknown part of the file /SASStudio/sasexec/sessions/{sessionID}/sql of the component POST Body Handler. The manipulation leads to sql injection. This vulnerability is uniquely identified as CVE-2024-48733. It
vuldb.com
rss
forum
news

Social Media

No tweets found for this CVE

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]http://sas.com
[email protected]https://github.com/ACN-CVEs/CVE-2024-48733/blob/ea2da31c3d6e0140edd6a1455e6157b8ba2f7a67/SQL%20injection.pdf

CWE Details

CWE IDCWE NameDescription
CWE-89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence