CVE-2024-26164: Microsoft Django Backend for SQL Server Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 8.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Mar
Released
2024-03-12
EPSS Score
6.27% (percentile: 90.9%)

FAQ

How could an attacker exploit the vulnerability? An attacker could use the unsanitized parameter into a SQL query to trigger SQL Injection. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Successful exploitation of this vulnerability simply requires the attacker or targeted user to leverage a Microsoft Access application to automatically talk to a SQL Server while utilizing a remote SQL Server address that they control.

Affected Products (1)

SQL Server

  • SQL Server backend for Django

Security Updates (1)

Acknowledgments

<a href="https://www.linkedin.com/in/federicoemartinez/">Federico Martinez</a>

Revision History

  • 2024-03-12: Information published.