In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-17387 In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 16 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Title SQL Injection in Symphony Plus SQL Injection in Symphony Plus

cve-icon MITRE

Status: PUBLISHED

Assigner: ABB

Published:

Updated: 2024-09-16T16:23:58.092Z

Reserved: 2020-08-26T00:00:00

Link: CVE-2020-24673

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-22T22:15:13.053

Modified: 2024-11-21T05:15:38.817

Link: CVE-2020-24673

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.