SQL injection vulnerability in the "Users management" functionality in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 allows authenticated attackers to manipulate an SQL query within the application by sending additional SQL commands to the application server. An attacker can use this vulnerability to perform malicious tasks such as to extract, change, or delete sensitive information within the database supporting the application, and potentially run system commands on the underlying operating system.
References
Link | Resource |
---|---|
https://sourceforge.net/p/seeddms/code/ci/seeddms-5.1.x/tree/CHANGELOG | Patch Release Notes Third Party Advisory |
https://www.contextis.com/resources/advisories/cve-2018-12942 | Patch Third Party Advisory |
https://sourceforge.net/p/seeddms/code/ci/seeddms-5.1.x/tree/CHANGELOG | Patch Release Notes Third Party Advisory |
https://www.contextis.com/resources/advisories/cve-2018-12942 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://sourceforge.net/p/seeddms/code/ci/seeddms-5.1.x/tree/CHANGELOG - Patch, Release Notes, Third Party Advisory | |
References | () https://www.contextis.com/resources/advisories/cve-2018-12942 - Patch, Third Party Advisory |
Information
Published : 2018-07-31 14:29
Updated : 2024-11-21 03:46
NVD link : CVE-2018-12942
Mitre link : CVE-2018-12942
CVE.ORG link : CVE-2018-12942
JSON object : View
Products Affected
seeddms
- seeddms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')