VYPR
High severity8.2NVD Advisory· Published May 1, 2024· Updated Apr 15, 2026

CVE-2024-33292

CVE-2024-33292

Description

SQL Injection vulnerability in Realisation MGSD v.1.0 allows a remote attacker to obtain sensitive information via the id parameter.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2024-33292 is a blind SQL injection in Realisation MGSD v1.0's id parameter, allowing remote unauthenticated attackers to extract sensitive database information.

Overview

CVE-2024-33292 describes a blind SQL injection vulnerability in Conception & Réalisation MGSD version 1.0. The flaw resides in the id parameter of the under_products_marechal.php endpoint. An unauthenticated remote attacker can inject arbitrary SQL commands through this parameter, as demonstrated in the provided exploit proof-of-concept [1].

Exploitation

The attack requires no authentication and can be performed over HTTP. The vulnerable endpoint does not properly sanitize or parameterize the id input, allowing an attacker to craft malicious SQL queries. The exploit example shows a simple GET request to /under_products_marechal.php?id= with the injection payload appended, indicating a classic boolean-based blind SQL injection technique [1].

Impact

Successful exploitation enables an attacker to retrieve sensitive information from the underlying database, such as user credentials, personal data, or other confidential records. Given the blind nature of the injection, an attacker can systematically extract data character by character using conditional responses [1]. This can lead to full database compromise and subsequent lateral movement within the application's ecosystem.

Mitigation

The vendor, Realisation, has not released a patched version as of the publication date. Users of MGSD v1.0 should immediately apply input validation and use prepared statements for database queries. Additionally, restricting network access to the vulnerable endpoint and monitoring for anomalous SQL traffic can reduce risk [1].

References
  1. 2023090062.txt

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.