An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the ConfigurationServlet endpoint, which listens on TCP port 8080 by default. An unauthenticated remote attacker can craft a special column_value parameter in the setConfiguration action to bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform SQL injection. For example, the attacker can exploit the vulnerability to retrieve the iView admin password.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2022-32 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2022-32 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2022-32 - Exploit, Third Party Advisory |
Information
Published : 2022-09-27 23:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3323
Mitre link : CVE-2022-3323
CVE.ORG link : CVE-2022-3323
JSON object : View
Products Affected
advantech
- iview
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')