In Sentrifugo 3.2, admin can edit employee's informations via this endpoint --> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, "employeeNumId" parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database.
References
Link | Resource |
---|---|
https://fatihhcelik.blogspot.com/2020/10/sentrifugo-version-32-sqli.html | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-11-12 19:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-26805
Mitre link : CVE-2020-26805
CVE.ORG link : CVE-2020-26805
JSON object : View
Products Affected
sapplica
- sentrifugo
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')