CVE-2022-34876

SQL Injection vulnerability in admin interface (/vicidial/admin.php) of VICIdial via modify_email_accounts, access_recordings, and agentcall_email parameters allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. This issue affects: VICIdial 2.14b0.5 versions prior to 3555.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vicidial:vicidial:2.14b0.5:3555:*:*:*:*:*:*

History

21 Nov 2024, 07:10

Type Values Removed Values Added
References () https://github.com/rapid7/metasploit-framework/pull/16732 - Patch, Third Party Advisory () https://github.com/rapid7/metasploit-framework/pull/16732 - Patch, Third Party Advisory
References () https://www.vicidial.org/VICIDIALforum/viewtopic.php?f=4&t=41300&sid=aacb27a29fefd85265b4d55fe51122af - Vendor Advisory () https://www.vicidial.org/VICIDIALforum/viewtopic.php?f=4&t=41300&sid=aacb27a29fefd85265b4d55fe51122af - Vendor Advisory
CVSS v2 : 8.5
v3 : 8.8
v2 : 8.5
v3 : 5.5

13 Jul 2022, 17:30

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 8.5
v3 : 8.8
CWE CWE-89
CPE cpe:2.3:a:vicidial:vicidial:2.14b0.5:3555:*:*:*:*:*:*
References (CONFIRM) https://www.vicidial.org/VICIDIALforum/viewtopic.php?f=4&t=41300&sid=aacb27a29fefd85265b4d55fe51122af - (CONFIRM) https://www.vicidial.org/VICIDIALforum/viewtopic.php?f=4&t=41300&sid=aacb27a29fefd85265b4d55fe51122af - Vendor Advisory
References (MISC) https://github.com/rapid7/metasploit-framework/pull/16732 - (MISC) https://github.com/rapid7/metasploit-framework/pull/16732 - Patch, Third Party Advisory

05 Jul 2022, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-05 16:15

Updated : 2024-11-21 07:10


NVD link : CVE-2022-34876

Mitre link : CVE-2022-34876

CVE.ORG link : CVE-2022-34876


JSON object : View

Products Affected

vicidial

  • vicidial
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')