CVE-2021-41932

A blind SQL injection vulnerability in search form in TeamMate+ Audit version 28.0.19.0 allows any authenticated user to create malicious SQL injections, which can result in complete database compromise, gaining information about other users, unauthorized access to audit data etc.
References
Link Resource
https://mjilek.cz/blog/CVE-2021-41932/ Exploit Third Party Advisory
https://mjilek.cz/blog/CVE-2021-41932/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolterskluwer:teammate\+_audit:28.0.19.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:26

Type Values Removed Values Added
References () https://mjilek.cz/blog/CVE-2021-41932/ - Exploit, Third Party Advisory () https://mjilek.cz/blog/CVE-2021-41932/ - Exploit, Third Party Advisory

Information

Published : 2022-06-06 15:15

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41932

Mitre link : CVE-2021-41932

CVE.ORG link : CVE-2021-41932


JSON object : View

Products Affected

wolterskluwer

  • teammate\+_audit
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')