An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The employee and sort_order parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-09-12 14:29
Updated : 2024-02-28 16:48
NVD link : CVE-2018-3883
Mitre link : CVE-2018-3883
CVE.ORG link : CVE-2018-3883
JSON object : View
Products Affected
erpnext
- erpnext
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')