{"uuid": "247ab065-1531-47d1-99bc-ff91fb13ea98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45794", "type": "seen", "source": "https://t.me/cvedetector/10109", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45794 - Devtron SQL Injection Vulnerability in CreateUser API\", \n  \"Content\": \"CVE ID : CVE-2024-45794 \nPublished : Nov. 7, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : devtron is an open source tool integration platform for Kubernetes. In affected versions an authenticated user (with minimum permission) could utilize and exploit SQL Injection to allow the execution of malicious SQL queries via CreateUser API (/orchestrator/user). This issue has been addressed in version 0.7.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T20:16:52.000000Z"}