An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. This can occur via username[0] to the default URI, because of includes/authenticate.inc.php.
References
Link | Resource |
---|---|
https://gist.github.com/ahpaleus/c9ee1108d146a94470f191fc423bee10 | Vendor Advisory |
https://gist.github.com/ahpaleus/c9ee1108d146a94470f191fc423bee10 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/ahpaleus/c9ee1108d146a94470f191fc423bee10 - Vendor Advisory |
Information
Published : 2020-09-25 18:15
Updated : 2024-11-21 05:17
NVD link : CVE-2020-25147
Mitre link : CVE-2020-25147
CVE.ORG link : CVE-2020-25147
JSON object : View
Products Affected
observium
- observium
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')