A SQL injection vulnerability exists in the “reporter events type” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
References
| Link | Resource |
|---|---|
| https://www.securifera.com/advisories/cve-2022-48599/ | Third Party Advisory |
| https://www.securifera.com/advisories/cve-2022-48599/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.securifera.com/advisories/cve-2022-48599/ - Third Party Advisory | |
| Summary |
|
11 Aug 2023, 18:09
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CWE | CWE-89 | |
| References | (MISC) https://www.securifera.com/advisories/cve-2022-48599/ - Third Party Advisory | |
| CPE | cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:* |
09 Aug 2023, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-08-09 19:15
Updated : 2024-11-21 07:33
NVD link : CVE-2022-48599
Mitre link : CVE-2022-48599
CVE.ORG link : CVE-2022-48599
JSON object : View
Products Affected
sciencelogic
- sl1
