CVE-2022-3323

An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the ConfigurationServlet endpoint, which listens on TCP port 8080 by default. An unauthenticated remote attacker can craft a special column_value parameter in the setConfiguration action to bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform SQL injection. For example, the attacker can exploit the vulnerability to retrieve the iView admin password.
References
Link Resource
https://www.tenable.com/security/research/tra-2022-32 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2022-32 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:advantech:iview:5.7.04.6469:*:*:*:*:*:*:*

History

21 Nov 2024, 07:19

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2022-32 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2022-32 - Exploit, Third Party Advisory

Information

Published : 2022-09-27 23:15

Updated : 2024-11-21 07:19


NVD link : CVE-2022-3323

Mitre link : CVE-2022-3323

CVE.ORG link : CVE-2022-3323


JSON object : View

Products Affected

advantech

  • iview
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')