Security Onion Solutions Squert version 1.1.1 through 1.6.7 contains a SQL Injection vulnerability in .inc/callback.php that can result in execution of SQL commands. This attack appear to be exploitable via Web request to .inc/callback.php with the payload in the sensors parameter, used in ec(). This vulnerability appears to have been fixed in 1.7.0.
References
Link | Resource |
---|---|
http://blog.securityonion.net/2018/01/security-advisory-for-squert.html | Patch Vendor Advisory |
http://blog.securityonion.net/2018/01/security-advisory-for-squert.html | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.securityonion.net/2018/01/security-advisory-for-squert.html - Patch, Vendor Advisory |
Information
Published : 2018-02-09 23:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000044
Mitre link : CVE-2018-1000044
CVE.ORG link : CVE-2018-1000044
JSON object : View
Products Affected
securityonion
- squert
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')