Description
A Blind SQL injection vulnerability exists in the /DataHandler/HandlerAlarmGroup.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter agid before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-24845 | A Blind SQL injection vulnerability exists in the /DataHandler/HandlerAlarmGroup.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter agid before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER. |
References
| Link | Providers |
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-21-238-03 |
|
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-04T01:37:16.590Z
Reserved: 2021-08-10T00:00:00.000Z
Link: CVE-2021-38393
No data.
Status : Modified
Published: 2021-08-30T18:15:09.700
Modified: 2024-11-21T06:16:59.210
Link: CVE-2021-38393
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD