Blind SQL injection in the login form in ServiceTonic Helpdesk software < 9.0.35937 allows attacker to exfiltrate information via specially crafted HQL-compatible time-based SQL queries.
References
Link | Resource |
---|---|
https://www.servicetonic.com/ | Product |
https://www.srlabs.de/bites/chaining-three-zero-day-exploits-in-itsm-software-servicetonic-for-remote-code-execution | Exploit Third Party Advisory |
https://www.servicetonic.com/ | Product |
https://www.srlabs.de/bites/chaining-three-zero-day-exploits-in-itsm-software-servicetonic-for-remote-code-execution | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.servicetonic.com/ - Product | |
References | () https://www.srlabs.de/bites/chaining-three-zero-day-exploits-in-itsm-software-servicetonic-for-remote-code-execution - Exploit, Third Party Advisory |
Information
Published : 2021-11-08 15:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-28022
Mitre link : CVE-2021-28022
CVE.ORG link : CVE-2021-28022
JSON object : View
Products Affected
servicetonic
- servicetonic
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')