Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w2wq-qfvf-7xgj

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

JIWA Financials 6.4.14 passes a Microsoft SQL Server account's username and password, and the name of a data source, to a Crystal Reports .rpt file, which allows remote authenticated users to execute certain standard stored procedures by referencing them in a user-written .rpt file, as demonstrated by using a stored procedure that provides the username and cleartext password of every account.

JIWA Financials 6.4.14 passes a Microsoft SQL Server account's username and password, and the name of a data source, to a Crystal Reports .rpt file, which allows remote authenticated users to execute certain standard stored procedures by referencing them in a user-written .rpt file, as demonstrated by using a stored procedure that provides the username and cleartext password of every account.

EPSS

Процентиль: 79%
0.01206
Низкий

Связанные уязвимости

nvd
больше 19 лет назад

JIWA Financials 6.4.14 passes a Microsoft SQL Server account's username and password, and the name of a data source, to a Crystal Reports .rpt file, which allows remote authenticated users to execute certain standard stored procedures by referencing them in a user-written .rpt file, as demonstrated by using a stored procedure that provides the username and cleartext password of every account.

EPSS

Процентиль: 79%
0.01206
Низкий