Description
Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials.
No analysis available yet.
Remediation
Vendor Solution
Single Connect should be updated to the latest version provided by the vendor.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-31597 | Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials. |
References
| Link | Providers |
|---|---|
| https://www.usom.gov.tr/bildirim/tr-22-0093 |
|
History
Tue, 17 Sep 2024 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials. | Single Connect does not perform an authorization check when using the sc-reports-ui" module. A remote attacker could exploit this vulnerability to access the device configuration page and export the data to an external file. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information including the database credentials. Since the database runs with high privileges it is possible to execute commands with the attained credentials. |
Status: PUBLISHED
Assigner: TR-CERT
Published:
Updated: 2024-09-17T04:10:26.927Z
Reserved: 2021-12-10T00:00:00.000Z
Link: CVE-2021-44793
No data.
Status : Modified
Published: 2022-01-27T13:15:07.903
Modified: 2024-11-21T06:31:33.857
Link: CVE-2021-44793
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD