SQL Injection vulnerability in inxedu 2.0.6 allows attackers to execute arbitrary commands via the functionIds parameter to /saverolefunction.
References
Link | Resource |
---|---|
http://8sec.cc/index.php/archives/330/ | Broken Link |
https://gitee.com/inxeduopen/inxedu/issues/I14DNG | Exploit Issue Tracking Third Party Advisory |
http://8sec.cc/index.php/archives/330/ | Broken Link |
https://gitee.com/inxeduopen/inxedu/issues/I14DNG | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 05:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () http://8sec.cc/index.php/archives/330/ - Broken Link | |
References | () https://gitee.com/inxeduopen/inxedu/issues/I14DNG - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2023-01-20 19:15
Updated : 2024-11-21 05:12
NVD link : CVE-2020-21152
Mitre link : CVE-2020-21152
CVE.ORG link : CVE-2020-21152
JSON object : View
Products Affected
inxedu
- inxedu
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')