Re:Desk 2.3 contains a blind unauthenticated SQL injection vulnerability in the getBaseCriteria() function in the protected/models/Ticket.php file. By modifying the folder GET parameter, it is possible to execute arbitrary SQL statements via a crafted URL. Unauthenticated remote command execution is possible by using this SQL injection to update certain database values, which are then executed by a bizRule eval() function in the yii/framework/web/auth/CAuthManager.php file. Resultant authorization bypass is also possible, by recovering or modifying password hashes and password reset tokens, allowing for administrative privileges to be obtained.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T13:15:20.782Z

Reserved: 2020-07-01T00:00:00

Link: CVE-2020-15487

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-30T18:15:22.273

Modified: 2024-11-21T05:05:37.170

Link: CVE-2020-15487

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.