The SIMPLE.ERP client stores superuser password in a recoverable format, allowing any authenticated SIMPLE.ERP user to escalate privileges to a database administrator.
This issue affect SIMPLE.ERP from 6.20 through 6.30. Only the 6.30 version received a patch 6.30@a03.9, which removed the vulnerability. Versions 6.20 and 6.25 remain unpatched.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Mar 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The SIMPLE.ERP client stores superuser password in a recoverable format, allowing any authenticated SIMPLE.ERP user to escalate privileges to a database administrator. This issue affect SIMPLE.ERP from 6.20 through 6.30. Only the 6.30 version received a patch 6.30@a03.9, which removed the vulnerability. Versions 6.20 and 6.25 remain unpatched. | |
| Title | Privilege Escalation in SIMPLE.ERP | |
| Weaknesses | CWE-257 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-03-24T12:34:44.074Z
Updated: 2025-03-24T13:02:21.414Z
Reserved: 2024-09-13T07:44:59.997Z
Link: CVE-2024-8774
Updated: 2025-03-24T13:02:17.942Z
Status : Awaiting Analysis
Published: 2025-03-24T13:15:25.693
Modified: 2025-03-27T16:44:44.143
Link: CVE-2024-8774
No data.