An issue was discovered in EyesOfNetwork eonweb 5.1 through 5.3 before 5.3-3. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the user_id field in a cookie.
References
| Link | Resource |
|---|---|
| https://github.com/EyesOfNetworkCommunity/eonweb/issues/51 | Exploit Third Party Advisory |
| https://github.com/EyesOfNetworkCommunity/eonweb/releases/tag/5.3-3 | Release Notes Third Party Advisory |
| https://github.com/EyesOfNetworkCommunity/eonweb/issues/51 | Exploit Third Party Advisory |
| https://github.com/EyesOfNetworkCommunity/eonweb/releases/tag/5.3-3 | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 05:40
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/EyesOfNetworkCommunity/eonweb/issues/51 - Exploit, Third Party Advisory | |
| References | () https://github.com/EyesOfNetworkCommunity/eonweb/releases/tag/5.3-3 - Release Notes, Third Party Advisory |
Information
Published : 2020-02-28 20:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9465
Mitre link : CVE-2020-9465
CVE.ORG link : CVE-2020-9465
JSON object : View
Products Affected
eyesofnetwork
- eyesofnetwork
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
