An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The searchfield parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required.
                
            References
                    | Link | Resource | 
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 | Exploit Third Party Advisory | 
Configurations
                    Information
                Published : 2018-09-12 07:29
Updated : 2023-02-02 05:35
NVD link : CVE-2018-3882
Mitre link : CVE-2018-3882
JSON object : View
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
                erpnext
- erpnext
 


