CWEBNET/WOSummary/List in ZUUSE BEIMS ContractorWeb .NET 5.18.0.0 allows SQL injection via the tradestatus, assetno, assignto, building, domain, jobtype, site, trade, woType, workorderno, or workorderstatus parameter.
References
Link | Resource |
---|---|
https://0day.today/exploit/29277 | |
https://becomepentester.blogspot.com/2017/12/ZUUSE-BEIMS-ContractorWeb-SQLInjection-CVE-2017-17721.html | Issue Tracking Third Party Advisory |
https://cxsecurity.com/issue/WLB-2017120155 | |
https://packetstormsecurity.com/files/145511/BEIMS-ContractorWeb-5.18.0.0-SQL-Injection.html | |
https://www.cyber-security.ro/blog/2017/12/20/beims-contractorweb-5-18-0-0-sql-injection/ | |
https://www.exploit-db.com/exploits/43379/ | Issue Tracking Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2017-12-18 16:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-17721
Mitre link : CVE-2017-17721
CVE.ORG link : CVE-2017-17721
JSON object : View
Products Affected
zuuse
- beims_contractorweb_.net
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')