CVE-2024-24213
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query. NOTE: the vendor's position is that this is an intended feature; also, it exists in the Supabase dashboard product, not the Supabase PostgreSQL product. Specifically, /pg_meta/default/query is for SQL queries that are entered in an intended UI by an authorized user. Nothing is injected.
| Vendor | n/a |
| Product | n/a |
| Published | Feb 8, 2024 |
| Last Updated | Aug 19, 2024 |
Stay Ahead of the Next One
Get instant alerts for n/a n/a
Be the first to know when new critical vulnerabilities affecting n/a n/a are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
n/a / n/a
n/a
References
app.flows.sh: https://app.flows.sh:8443/project/default%2C reference1.example.com: https://reference1.example.com/project/default/logs/explorer%2C postfixadmin.ballardini.com.ar: https://postfixadmin.ballardini.com.ar:8443/project/default/logs/explorer. github.com: https://github.com/940198871/Vulnerability-details/blob/main/CVE-2024-24213 supabase.com: https://supabase.com/docs/guides/database/overview#the-sql-editor