CVE-2020-13589

An exploitable SQL injection vulnerability exists in the ‘entities/fields’ page of the Rukovoditel Project Management App 2.7.2. The entities_id parameter in the 'entities/fields page (mulitple_edit or copy_selected or export function) is vulnerable to authenticated SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability, this can be done either with administrator credentials or through cross-site request forgery.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:*

History

25 Aug 2021, 01:40

Type Values Removed Values Added
References (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199 - (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199 - Exploit, Third Party Advisory
CPE cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:*
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.8

17 Aug 2021, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-17 20:15

Updated : 2024-02-04 21:47


NVD link : CVE-2020-13589

Mitre link : CVE-2020-13589

CVE.ORG link : CVE-2020-13589


JSON object : View

Products Affected

rukovoditel

  • rukovoditel
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')