/claim #13178
This PR adds a Nuclei template for CVE-2024-13979, a critical SQL injection vulnerability in St. Joe ERP System that allows unauthenticated remote attackers to execute arbitrary SQL commands.
http/cves/2024/CVE-2024-13979.yaml - Main detection templatehttp/cves/2024/CVE-2024-13979-alt.yaml - Alternative endpoints detection✅ Complete POC - Not relying on version detection ✅ Multiple endpoints covered (3 vulnerable DWR interfaces) ✅ SQL result extraction via regex extractors ✅ Time-based blind injection detection ✅ Debug data provided (sent to templates@projectdiscovery.io) ✅ Mock vulnerable environment included for testing
The template detects SQL injection in:
/erp/dwr/call/plaincall/NamedParameterSingleRowQueryConvertor.queryForString.dwr/erp/dwr/call/plaincall/SingleRowQueryConvertor.queryForString.dwr/erp/dwr/call/plaincall/ResultSetConvertor.queryForMapWithDefaultValues.dwrnuclei -validate -t CVE-2024-13979.yaml
# ✓ All templates validated successfully
A complete mock vulnerable server has been provided and tested:
# Setup instructions and test environment details
# sent to templates@projectdiscovery.io
Complete debug data including:
Debug data and vulnerable environment setup sent to: templates@projectdiscovery.io
nuclei -validateThis template meets all requirements:
Bounty Issue: #13178
Email sent to: templates@projectdiscovery.io
PR includes: Template files only (debug data sent via email)
Anudeep Adiraju
@anudeepadi
ProjectDiscovery
@projectdiscovery