Description
In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-17387 | In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability. |
References
History
Mon, 16 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | SQL Injection in Symphony Plus | SQL Injection in Symphony Plus |
Status: PUBLISHED
Assigner: ABB
Published:
Updated: 2024-09-16T16:23:58.092Z
Reserved: 2020-08-26T00:00:00.000Z
Link: CVE-2020-24673
No data.
Status : Modified
Published: 2020-12-22T22:15:13.053
Modified: 2024-11-21T05:15:38.817
Link: CVE-2020-24673
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD