An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The employee and sort_order parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required.
                
            References
                    | Link | Resource | 
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 | Exploit Third Party Advisory | 
Configurations
                    Information
                Published : 2018-09-12 07:29
Updated : 2023-02-02 05:33
NVD link : CVE-2018-3883
Mitre link : CVE-2018-3883
JSON object : View
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
                erpnext
- erpnext
 


