Vulnerabilidad en Advantech iView, versiones 5.6 y anteriores, contiene múltiples vulnerabilidades de inyección SQL (CVE-2020-14497)
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
CWE-89
Neutralización incorrecta de elementos especiales usados en un comando SQL (Inyección SQL)
Fecha de publicación:
15/07/2020
Última modificación:
21/07/2020
Descripción
Advantech iView, versiones 5.6 y anteriores, contiene múltiples vulnerabilidades de inyección SQL que son vulnerables al uso de una cadena controlada por el atacante en la construcción de consultas SQL. Un atacante podría extraer las credenciales del usuario, leer o modificar la información y ejecutar el código de forma remota
Impacto
Puntuación base 3.x
9.80
Gravedad 3.x
CRÍTICA
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:* | 5.6 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://us-cert.cisa.gov/ics/advisories/icsa-20-196-01
- https://www.zerodayinitiative.com/advisories/ZDI-20-827/
- https://www.zerodayinitiative.com/advisories/ZDI-20-828/
- https://www.zerodayinitiative.com/advisories/ZDI-20-830/
- https://www.zerodayinitiative.com/advisories/ZDI-20-832/
- https://www.zerodayinitiative.com/advisories/ZDI-20-833/
- https://www.zerodayinitiative.com/advisories/ZDI-20-835/
- https://www.zerodayinitiative.com/advisories/ZDI-20-836/
- https://www.zerodayinitiative.com/advisories/ZDI-20-837/
- https://www.zerodayinitiative.com/advisories/ZDI-20-838/
- https://www.zerodayinitiative.com/advisories/ZDI-20-839/
- https://www.zerodayinitiative.com/advisories/ZDI-20-842/
- https://www.zerodayinitiative.com/advisories/ZDI-20-843/
- https://www.zerodayinitiative.com/advisories/ZDI-20-844/
- https://www.zerodayinitiative.com/advisories/ZDI-20-845/
- https://www.zerodayinitiative.com/advisories/ZDI-20-846/
- https://www.zerodayinitiative.com/advisories/ZDI-20-847/
- https://www.zerodayinitiative.com/advisories/ZDI-20-848/
- https://www.zerodayinitiative.com/advisories/ZDI-20-849/
- https://www.zerodayinitiative.com/advisories/ZDI-20-850/
- https://www.zerodayinitiative.com/advisories/ZDI-20-851/
- https://www.zerodayinitiative.com/advisories/ZDI-20-852/
- https://www.zerodayinitiative.com/advisories/ZDI-20-853/
- https://www.zerodayinitiative.com/advisories/ZDI-20-854/
- https://www.zerodayinitiative.com/advisories/ZDI-20-855/
- https://www.zerodayinitiative.com/advisories/ZDI-20-856/
- https://www.zerodayinitiative.com/advisories/ZDI-20-857/
- https://www.zerodayinitiative.com/advisories/ZDI-20-858/
- https://www.zerodayinitiative.com/advisories/ZDI-20-860/
- https://www.zerodayinitiative.com/advisories/ZDI-20-861/
- https://www.zerodayinitiative.com/advisories/ZDI-20-862/
- https://www.zerodayinitiative.com/advisories/ZDI-20-863/
- https://www.zerodayinitiative.com/advisories/ZDI-20-864/
- https://www.zerodayinitiative.com/advisories/ZDI-20-865/
- https://www.zerodayinitiative.com/advisories/ZDI-20-866/
- https://www.zerodayinitiative.com/advisories/ZDI-20-868/
- https://www.zerodayinitiative.com/advisories/ZDI-20-869/