Show plain JSON{"id": "CVE-2020-15008", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.6}]}, "published": "2020-07-07T20:15:10.103", "references": [{"url": "https://slagle.tech/2020/07/06/cve-2020-15008/", "tags": ["Not Applicable"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12."}, {"lang": "es", "value": "Se presenta un SQLi en el c\u00f3digo de sonda de todas las versiones de Connectwise Automate anteriores a 2020.7 o 2019.12. Se presenta una inyecci\u00f3n SQL en la implementaci\u00f3n de la sonda para guardar datos en una tabla personalizada debido a una comprobaci\u00f3n inadecuada del lado del servidor. A medida que el c\u00f3digo crea un SQL din\u00e1mico para la instrucci\u00f3n de inserci\u00f3n y utiliza el nombre de la tabla suministrado por el usuario con poca comprobaci\u00f3n, el nombre de la tabla puede ser modificado para permitir que comandos de actualizaci\u00f3n arbitrarios se ejecuten. El uso de otras t\u00e9cnicas de inyecci\u00f3n SQL, como los ataques de sincronizaci\u00f3n, son posibles para realizar una extracci\u00f3n de datos completa. Parcheado en versi\u00f3n 2020.7 y en un hotfix para 2019.12"}], "lastModified": "2020-07-16T18:19:15.323", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:connectwise:connectwise_automate:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E91202B6-DF69-486C-9CF2-B000974D6868", "versionEndExcluding": "2020.7"}, {"criteria": "cpe:2.3:a:connectwise:connectwise_automate:2019.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A7D5ECB-5762-4D24-BF64-CB146A57A91F"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}