fkie_cve-2020-25147
Vulnerability from fkie_nvd
Published
2020-09-25 18:15
Modified
2024-11-21 05:17
Severity ?
Summary
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. This can occur via username[0] to the default URI, because of includes/authenticate.inc.php.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:community:*:*:*", "matchCriteriaId": "A10D901F-6123-433A-8EB3-951C0345A24B", "vulnerable": true }, { "criteria": "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C7176124-B91A-4013-8242-44374DB62624", "vulnerable": true }, { "criteria": "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:professional:*:*:*", "matchCriteriaId": "93B444CB-8890-466D-B9C4-2BEC146C79CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Observium Professional, Enterprise \u0026 Community 20.8.10631. It is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. This can occur via username[0] to the default URI, because of includes/authenticate.inc.php." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Observium Professional, Enterprise \u0026amp; Community versi\u00f3n 20.8.10631.\u0026#xa0;Es vulnerable a una inyecci\u00f3n SQL debido al hecho de que es posible inyectar sentencias SQL maliciosas en tipos de par\u00e1metros malformados.\u0026#xa0;Esto puede ocurrir mediante el username[0] en el URI predeterminado, debido al archivo includes/authenticate.inc.php" } ], "id": "CVE-2020-25147", "lastModified": "2024-11-21T05:17:28.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-25T18:15:15.613", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://gist.github.com/ahpaleus/c9ee1108d146a94470f191fc423bee10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gist.github.com/ahpaleus/c9ee1108d146a94470f191fc423bee10" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…