CVE-2024-57716

7.5 HIGH

📋 TL;DR

CVE-2024-57716 is an information disclosure vulnerability in trenoncourt AutoQueryable v1.7.0 that allows remote attackers to access sensitive data through the Unselectable function. This affects any application using the vulnerable AutoQueryable library version. Attackers can exploit this to retrieve information that should be protected.

💻 Affected Systems

Products:
  • trenoncourt AutoQueryable
Versions: v1.7.0
Operating Systems: All platforms running .NET applications
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using the AutoQueryable library with the vulnerable Unselectable function implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of sensitive database information including user credentials, personal data, or proprietary business information to unauthorized parties.

🟠

Likely Case

Partial data leakage where attackers can extract specific sensitive fields from database queries that should be restricted.

🟢

If Mitigated

Limited exposure of non-critical data with proper input validation and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of the AutoQueryable API and crafting specific queries to bypass the Unselectable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after v1.7.0

Vendor Advisory: https://github.com/trenoncourt/AutoQueryable

Restart Required: No

Instructions:

1. Update AutoQueryable package to latest version. 2. Run application tests to ensure compatibility. 3. Deploy updated application.

🔧 Temporary Workarounds

Disable AutoQueryable Unselectable Feature

all

Temporarily disable or restrict the Unselectable function in AutoQueryable configuration

Configure AutoQueryableOptions to restrict sensitive fields

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all AutoQueryable API endpoints
  • Deploy web application firewall rules to block suspicious query patterns targeting the Unselectable function

🔍 How to Verify

Check if Vulnerable:

Check if your application uses AutoQueryable v1.7.0 via package manager or dependency check

Check Version:

Check package.json, .csproj, or NuGet package manager for AutoQueryable version

Verify Fix Applied:

Verify AutoQueryable package version is updated beyond v1.7.0 and test that sensitive data cannot be accessed via Unselectable function

📡 Detection & Monitoring

Log Indicators:

  • Unusual query patterns targeting normally restricted fields
  • Multiple failed attempts to access protected data via AutoQueryable

Network Indicators:

  • HTTP requests with suspicious query parameters targeting AutoQueryable endpoints

SIEM Query:

source="application_logs" AND ("AutoQueryable" AND "Unselectable") AND status="200"

🔗 References

📤 Share & Export