CVE-2021-43481

An SQL Injection vulnerability exists in Webtareas 2.4p3 and earlier via the $uq HTTP POST parameter in editapprovalstage.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:webtareas_project:webtareas:*:*:*:*:*:*:*:*
cpe:2.3:a:webtareas_project:webtareas:2.4:-:*:*:*:*:*:*
cpe:2.3:a:webtareas_project:webtareas:2.4:p3:*:*:*:*:*:*

History

21 Nov 2024, 06:29

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/167026/WebTareas-2.4-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/167026/WebTareas-2.4-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () https://behradtaher.dev/2021/11/05/Discovering-a-Blind-SQL-Injection-Whitebox-Approach/ - Exploit, Technical Description, Third Party Advisory () https://behradtaher.dev/2021/11/05/Discovering-a-Blind-SQL-Injection-Whitebox-Approach/ - Exploit, Technical Description, Third Party Advisory
References () https://sourceforge.net/projects/webtareas/ - Product () https://sourceforge.net/projects/webtareas/ - Product

Information

Published : 2022-04-20 20:15

Updated : 2024-11-21 06:29


NVD link : CVE-2021-43481

Mitre link : CVE-2021-43481

CVE.ORG link : CVE-2021-43481


JSON object : View

Products Affected

webtareas_project

  • webtareas
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')