The SIMPLE.ERP client stores superuser password in a recoverable format, allowing any authenticated SIMPLE.ERP user to escalate privileges to a database administrator. This issue affect SIMPLE.ERP from 6.20 through 6.30. Only the 6.30 version received a patch [email protected], which removed the vulnerability. Versions 6.20 and 6.25 remain unpatched.
History

Mon, 24 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 24 Mar 2025 13:00:00 +0000

Type Values Removed Values Added
Description The SIMPLE.ERP client stores superuser password in a recoverable format, allowing any authenticated SIMPLE.ERP user to escalate privileges to a database administrator. This issue affect SIMPLE.ERP from 6.20 through 6.30. Only the 6.30 version received a patch [email protected], which removed the vulnerability. Versions 6.20 and 6.25 remain unpatched.
Title Privilege Escalation in SIMPLE.ERP
Weaknesses CWE-257
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2025-03-24T12:34:44.074Z

Updated: 2025-03-24T13:02:21.414Z

Reserved: 2024-09-13T07:44:59.997Z

Link: CVE-2024-8774

cve-icon Vulnrichment

Updated: 2025-03-24T13:02:17.942Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-24T13:15:25.693

Modified: 2025-03-27T16:44:44.143

Link: CVE-2024-8774

cve-icon Redhat

No data.