CVE-2021-36722

Emuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host.
References
Link Resource
https://www.gov.il/en/departments/faq/cve_advisories Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:emuse_-_eservices_\/_envoice_project:emuse_-_eservices_\/_envoice:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-12-29 15:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-36722

Mitre link : CVE-2021-36722

CVE.ORG link : CVE-2021-36722


JSON object : View

Products Affected

emuse_-_eservices_\/_envoice_project

  • emuse_-_eservices_\/_envoice
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')