Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p6rg-53wx-7278

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Sentrifugo 3.2, admin can edit employee's informations via this endpoint --> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, "employeeNumId" parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database.

In Sentrifugo 3.2, admin can edit employee's informations via this endpoint --> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, "employeeNumId" parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database.

EPSS

Процентиль: 67%
0.00533
Низкий

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 7.2
nvd
около 5 лет назад

In Sentrifugo 3.2, admin can edit employee's informations via this endpoint --> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, "employeeNumId" parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database.

EPSS

Процентиль: 67%
0.00533
Низкий

Дефекты

CWE-89