Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
This vulnerability has been mitigated in LogicalDOC Community and Enterprise Editions version 9.1 by commit e7cd313.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54091 | Saved search functionality contains a blind SQL injection that can be exploited by authenticated attackers. Using a time-based blind SQLi technique the attacker can disclose all database contents. Account takeover is a potential outcome depending on the presence or lack thereof entries in certain database tables. |
| Link | Providers |
|---|---|
| https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html |
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 18 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Mar 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Saved search functionality contains a blind SQL injection that can be exploited by authenticated attackers. Using a time-based blind SQLi technique the attacker can disclose all database contents. Account takeover is a potential outcome depending on the presence or lack thereof entries in certain database tables. | |
| Title | Blind SQLi in Saved Search | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: BlackDuck
Published:
Updated: 2025-03-18T16:37:33.586Z
Reserved: 2024-12-02T14:24:46.526Z
Link: CVE-2024-54447
Updated: 2025-03-17T16:21:19.041Z
Status : Deferred
Published: 2025-03-14T18:15:30.487
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-54447
No data.
OpenCVE Enrichment
No data.
EUVD