diskover-web v2.3.0 Community Edition is vulnerable to multiple boolean-based blind SQL injection flaws in its Elasticsearch configuration form. Unsanitized user input in POST parameters such as ES_PASS, ES_MAXSIZE, ES_TRANSLOGSIZE, ES_TIMEOUT, ES_USER, ES_HOST, ES_PORT, ES_SCROLLSIZE, ES_CHUNKSIZE and others can be crafted to inject arbitrary SQLite expressions wrapped in JSON functions. By exploiting these injection points, an attacker can infer or extract sensitive information from the underlying database without authentication. This issue stems from improper input validation and parameterization in the application's JSON-based query construction.
References
Link | Resource |
---|---|
https://github.com/4rdr/proofs/blob/main/info/diskover-web-v2.3.0-community-edition-sqli.md | Exploit Third Party Advisory |
Configurations
History
09 Sep 2025, 18:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/4rdr/proofs/blob/main/info/diskover-web-v2.3.0-community-edition-sqli.md - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:diskoverdata:diskover:2.3.0:*:*:*:community:*:*:* | |
First Time |
Diskoverdata diskover
Diskoverdata |
29 Aug 2025, 16:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
27 Aug 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CWE | CWE-89 |
27 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-27 16:15
Updated : 2025-09-09 18:46
NVD link : CVE-2025-50984
Mitre link : CVE-2025-50984
CVE.ORG link : CVE-2025-50984
JSON object : View
Products Affected
diskoverdata
- diskover
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')