In Sentrifugo 3.2, admin can edit employee's informations via this endpoint --> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, "employeeNumId" parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database.
References
Link | Resource |
---|---|
https://fatihhcelik.blogspot.com/2020/10/sentrifugo-version-32-sqli.html | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-11-12 11:15
Updated : 2020-11-17 07:43
NVD link : CVE-2020-26805
Mitre link : CVE-2020-26805
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
sapplica
- sentrifugo