CVE-2019-10123

SQL Injection in Advanced InfoData Systems (AIS) ESEL-Server 67 (which is the backend for the AIS logistics mobile app) allows an anonymous attacker to execute arbitrary code in the context of the user of the MSSQL database. The default user for the database is the 'sa' user.
References
Link Resource
https://github.com/rapid7/metasploit-framework/pull/11641/ Exploit Third Party Advisory
https://www.ais.de Vendor Advisory
https://github.com/rapid7/metasploit-framework/pull/11641/ Exploit Third Party Advisory
https://www.ais.de Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ais:logistic_software:*:*:*:*:*:*:*:*
cpe:2.3:h:ais:esel-server:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () https://github.com/rapid7/metasploit-framework/pull/11641/ - Exploit, Third Party Advisory () https://github.com/rapid7/metasploit-framework/pull/11641/ - Exploit, Third Party Advisory
References () https://www.ais.de - Vendor Advisory () https://www.ais.de - Vendor Advisory

Information

Published : 2019-05-31 22:29

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10123

Mitre link : CVE-2019-10123

CVE.ORG link : CVE-2019-10123


JSON object : View

Products Affected

ais

  • logistic_software
  • esel-server
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')