Description
GRANDCOM DynWEB before 4.2 contains a SQL Injection vulnerability in the admin login interface. A remote unauthenticated attacker can exploit this vulnerability to obtain administrative access to the webpage, access the user database, modify web content and upload custom files. The backend login script does not verify and sanitize user-provided strings.
Published: 2022-05-19
Score: 9.8 Critical
EPSS: 1.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-23978 GRANDCOM DynWEB before 4.2 contains a SQL Injection vulnerability in the admin login interface. A remote unauthenticated attacker can exploit this vulnerability to obtain administrative access to the webpage, access the user database, modify web content and upload custom files. The backend login script does not verify and sanitize user-provided strings.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T01:16:03.994Z

Reserved: 2021-07-23T00:00:00.000Z

Link: CVE-2021-37413

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-19T15:15:07.873

Modified: 2024-11-21T06:15:06.447

Link: CVE-2021-37413

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses