SQL Injection Affecting plumber.workflow package, versions [,10.1.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DOTNET-PLUMBERWORKFLOW-6673843
  • published 25 Apr 2024
  • disclosed 24 Apr 2024
  • credit Unknown

How to fix?

Upgrade Plumber.Workflow to version 10.1.2 or higher.

Overview

Affected versions of this package are vulnerable to SQL Injection due to a particular API endpoint modification by authenticated backoffice users, which allows the inclusion and execution of arbitrary SQL commands without proper sanitization or validation. An attacker can manipulate requests to execute unauthorized SQL commands by crafting malicious SQL statements included in the API requests.

Note:

This is only exploitable if the attacker has backoffice user access.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.5 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    High
  • Availability (A)
    None