An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1.
References
Link | Resource |
---|---|
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/ | Exploit Third Party Advisory |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-04-23 21:15
Updated : 2021-08-13 18:29
NVD link : CVE-2021-25899
Mitre link : CVE-2021-25899
CVE.ORG link : CVE-2021-25899
JSON object : View
Products Affected
void
- aurall_rec_monitor
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')