An exploitable SQL injection vulnerability exists in the "access_rules/rules_form" page of the Rukovoditel Project Management App 2.7.2. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability, this can be done either with administrator credentials or through cross-site request forgery.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published: 2021-04-09T17:45:16

Updated: 2024-08-04T12:25:16.311Z

Reserved: 2020-05-26T00:00:00

Link: CVE-2020-13591

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-09T18:15:13.023

Modified: 2024-11-21T05:01:34.197

Link: CVE-2020-13591

cve-icon Redhat

No data.