A vulnerability was found in rl-institut NESP2 Initial Release/1.0. It has been classified as critical. Affected is an unknown function of the file app/database.py. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 07c0cdf36cf6a4345086d07b54423723a496af5e. It is recommended to apply a patch to fix this issue. VDB-246642 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/rl-institut/NESP2/commit/07c0cdf36cf6a4345086d07b54423723a496af5e | Patch |
https://github.com/rl-institut/NESP2/issues/334 | Issue Tracking Patch |
https://github.com/rl-institut/NESP2/pull/333 | Issue Tracking Patch |
https://vuldb.com/?ctiid.246642 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.246642 | Permissions Required Third Party Advisory |
https://github.com/rl-institut/NESP2/commit/07c0cdf36cf6a4345086d07b54423723a496af5e | Patch |
https://github.com/rl-institut/NESP2/issues/334 | Issue Tracking Patch |
https://github.com/rl-institut/NESP2/pull/333 | Issue Tracking Patch |
https://vuldb.com/?ctiid.246642 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.246642 | Permissions Required Third Party Advisory |
Configurations
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.3 |
References | () https://github.com/rl-institut/NESP2/commit/07c0cdf36cf6a4345086d07b54423723a496af5e - Patch | |
References | () https://github.com/rl-institut/NESP2/issues/334 - Issue Tracking, Patch | |
References | () https://github.com/rl-institut/NESP2/pull/333 - Issue Tracking, Patch | |
References | () https://vuldb.com/?ctiid.246642 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.246642 - Permissions Required, Third Party Advisory |
07 Dec 2023, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://vuldb.com/?id.246642 - Permissions Required, Third Party Advisory | |
References | () https://github.com/rl-institut/NESP2/commit/07c0cdf36cf6a4345086d07b54423723a496af5e - Patch | |
References | () https://github.com/rl-institut/NESP2/pull/333 - Issue Tracking, Patch | |
References | () https://vuldb.com/?ctiid.246642 - Permissions Required, Third Party Advisory | |
References | () https://github.com/rl-institut/NESP2/issues/334 - Issue Tracking, Patch | |
CPE | cpe:2.3:a:reiner-lemoine-institut:nesp2:1.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
03 Dec 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-03 11:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-36768
Mitre link : CVE-2020-36768
CVE.ORG link : CVE-2020-36768
JSON object : View
Products Affected
reiner-lemoine-institut
- nesp2
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')