CVE-2021-41920

webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webtareas_project:webtareas:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:26

Type Values Removed Values Added
References () https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ - Exploit, Third Party Advisory () https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ - Exploit, Third Party Advisory

15 Oct 2021, 14:53

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:webtareas_project:webtareas:*:*:*:*:*:*:*:*
References (MISC) https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ - (MISC) https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ - Exploit, Third Party Advisory

08 Oct 2021, 17:44

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-08 16:15

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41920

Mitre link : CVE-2021-41920

CVE.ORG link : CVE-2021-41920


JSON object : View

Products Affected

webtareas_project

  • webtareas
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')