eMPS 9.0.1.923211 on the Central Management of FireEye EX 3500 devices allows remote authenticated users to conduct SQL injection attacks via the job_id parameter to the email search feature. According to the vendor, the issue is fixed in 9.0.3.
References
Link | Resource |
---|---|
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-006.txt | Exploit Third Party Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-006.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-006.txt - Exploit, Third Party Advisory |
Information
Published : 2021-04-01 20:15
Updated : 2024-11-21 06:00
NVD link : CVE-2021-28970
Mitre link : CVE-2021-28970
CVE.ORG link : CVE-2021-28970
JSON object : View
Products Affected
fireeye
- ex_3500
- email_malware_protection_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')