An issue was discovered in EyesOfNetwork eonweb 5.1 through 5.3 before 5.3-3. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the user_id field in a cookie.
References
Link | Resource |
---|---|
https://github.com/EyesOfNetworkCommunity/eonweb/issues/51 | Exploit Third Party Advisory |
https://github.com/EyesOfNetworkCommunity/eonweb/releases/tag/5.3-3 | Release Notes Third Party Advisory |
https://github.com/EyesOfNetworkCommunity/eonweb/issues/51 | Exploit Third Party Advisory |
https://github.com/EyesOfNetworkCommunity/eonweb/releases/tag/5.3-3 | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 05:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/EyesOfNetworkCommunity/eonweb/issues/51 - Exploit, Third Party Advisory | |
References | () https://github.com/EyesOfNetworkCommunity/eonweb/releases/tag/5.3-3 - Release Notes, Third Party Advisory |
Information
Published : 2020-02-28 20:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9465
Mitre link : CVE-2020-9465
CVE.ORG link : CVE-2020-9465
JSON object : View
Products Affected
eyesofnetwork
- eyesofnetwork
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')