Faveo Helpdesk 1.0-1.11.1 is vulnerable to SQL Injection. When the user logs in through the login box, he has no judgment on the validity of the user's input data. The parameters passed from the front end to the back end are controllable, which will lead to SQL injection.
References
Link | Resource |
---|---|
https://gist.github.com/Whitehat-Su/8402323c00ea93b4abc21ab9a372101e | Third Party Advisory |
https://github.com/ladybirdweb/faveo-helpdesk/issues/7827 | Exploit Issue Tracking Third Party Advisory |
https://gist.github.com/Whitehat-Su/8402323c00ea93b4abc21ab9a372101e | Third Party Advisory |
https://github.com/ladybirdweb/faveo-helpdesk/issues/7827 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 07:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/Whitehat-Su/8402323c00ea93b4abc21ab9a372101e - Third Party Advisory | |
References | () https://github.com/ladybirdweb/faveo-helpdesk/issues/7827 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2023-03-24 20:15
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25350
Mitre link : CVE-2023-25350
CVE.ORG link : CVE-2023-25350
JSON object : View
Products Affected
ladybirdweb
- faveo_helpdesk
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')