Computrols CBAS 18.0.0 allows Authenticated Blind SQL Injection via the id GET parameter, as demonstrated by the index.php?m=servers&a=start_pulling&id= substring.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/155251/Computrols-CBAS-Web-19.0.0-Blind-SQL-Injection.html | |
| https://applied-risk.com/index.php/download_file/view/196/165 | Third Party Advisory | 
| https://applied-risk.com/labs/advisories | Third Party Advisory | 
| http://packetstormsecurity.com/files/155251/Computrols-CBAS-Web-19.0.0-Blind-SQL-Injection.html | |
| https://applied-risk.com/index.php/download_file/view/196/165 | Third Party Advisory | 
| https://applied-risk.com/labs/advisories | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 04:19
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/155251/Computrols-CBAS-Web-19.0.0-Blind-SQL-Injection.html - | |
| References | () https://applied-risk.com/index.php/download_file/view/196/165 - Third Party Advisory | |
| References | () https://applied-risk.com/labs/advisories - Third Party Advisory | 
Information
                Published : 2019-05-23 19:29
Updated : 2024-11-21 04:19
NVD link : CVE-2019-10852
Mitre link : CVE-2019-10852
CVE.ORG link : CVE-2019-10852
JSON object : View
Products Affected
                computrols
- computrols_building_automation_software
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
