Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-52f9-rjh6-7wx2

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."

PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."

EPSS

Процентиль: 99%
0.77548
Высокий

Связанные уязвимости

nvd
больше 10 лет назад

PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."

EPSS

Процентиль: 99%
0.77548
Высокий