An SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Enterprise Data Historian 3.0.1.2/7.5.4989.33053. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. Parameter InstancePath in CHaD.asmx is vulnerable to unauthenticated SQL injection attacks.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106 | Exploit Technical Description Third Party Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-254-01 | Third Party Advisory US Government Resource |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106 | Exploit Technical Description Third Party Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-254-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106 - Exploit, Technical Description, Third Party Advisory | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-254-01 - Third Party Advisory, US Government Resource |
Information
Published : 2020-09-24 15:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13499
Mitre link : CVE-2020-13499
CVE.ORG link : CVE-2020-13499
JSON object : View
Products Affected
aveva
- edna_enterprise_data_historian
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')