CVE-2024-24213

critical

Description

Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query. NOTE: the vendor's position is that this is an intended feature; also, it exists in the Supabase dashboard product, not the Supabase PostgreSQL product. Specifically, /pg_meta/default/query is for SQL queries that are entered in an intended UI by an authorized user. Nothing is injected.

References

https://supabase.com/docs/guides/database/overview#the-sql-editor

https://reference1.example.com/project/default/logs/explorer%2C

https://postfixadmin.ballardini.com.ar:8443/project/default/logs/explorer.

https://github.com/940198871/Vulnerability-details/blob/main/CVE-2024-24213

https://app.flows.sh:8443/project/default%2C

Details

Source: Mitre, NVD

Published: 2024-02-08

Updated: 2024-08-21

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical