An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. This can occur via username[0] to the default URI, because of includes/authenticate.inc.php.
References
| Link | Resource |
|---|---|
| https://gist.github.com/ahpaleus/c9ee1108d146a94470f191fc423bee10 | Vendor Advisory |
| https://gist.github.com/ahpaleus/c9ee1108d146a94470f191fc423bee10 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/ahpaleus/c9ee1108d146a94470f191fc423bee10 - Vendor Advisory |
Information
Published : 2020-09-25 18:15
Updated : 2024-11-21 05:17
NVD link : CVE-2020-25147
Mitre link : CVE-2020-25147
CVE.ORG link : CVE-2020-25147
JSON object : View
Products Affected
observium
- observium
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
