CVE-2021-37749

MapService.svc in Hexagon GeoMedia WebMap 2020 before Update 2 (aka 16.6.2.66) allows blind SQL Injection via the Id (within sourceItems) parameter to the GetMap method.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hexagongeospatial:geomedia_webmap:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:15

Type Values Removed Values Added
References () https://download.hexagongeospatial.com/en/downloads/webgis/geomedia-webmap-2020-update-2 - Vendor Advisory () https://download.hexagongeospatial.com/en/downloads/webgis/geomedia-webmap-2020-update-2 - Vendor Advisory
References () https://www.hexagongeospatial.com/products/power-portfolio/geomedia-webmap - Product, Vendor Advisory () https://www.hexagongeospatial.com/products/power-portfolio/geomedia-webmap - Product, Vendor Advisory
References () https://www.silentgrid.com/blog/cve-2021-37749-hexagon-geomedia-webmap-2020-blind-sql-injection/ - Exploit, Third Party Advisory () https://www.silentgrid.com/blog/cve-2021-37749-hexagon-geomedia-webmap-2020-blind-sql-injection/ - Exploit, Third Party Advisory

Information

Published : 2021-08-30 04:15

Updated : 2024-11-21 06:15


NVD link : CVE-2021-37749

Mitre link : CVE-2021-37749

CVE.ORG link : CVE-2021-37749


JSON object : View

Products Affected

hexagongeospatial

  • geomedia_webmap
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')