CVE-2021-31818

Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*
cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*
cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*
cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:35

Type Values Removed Values Added
References
  • {'url': 'https://advisories.octopus.com/adv/2021-04---SQL-Injection-in-the-Events-REST-API-(CVE-2021-31818).2013233248.html', 'name': 'https://advisories.octopus.com/adv/2021-04---SQL-Injection-in-the-Events-REST-API-(CVE-2021-31818).2013233248.html', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • () https://advisories.octopus.com/adv/2021-04---SQL-Injection-in-the-Events-REST-API-%28CVE-2021-31818%29.2013233248.html -

Information

Published : 2021-06-17 14:15

Updated : 2024-02-28 18:28


NVD link : CVE-2021-31818

Mitre link : CVE-2021-31818

CVE.ORG link : CVE-2021-31818


JSON object : View

Products Affected

octopus

  • server
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')