Description
The application was vulnerable to multiple instances of SQL injection (authenticated and unauthenticated) through a vulnerable parameter. Due to the stacked query support, complex SQL commands could be crafted and injected into the vulnerable parameter and using a sleep based inferential SQL injection it was possible to extract data from the database.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42491 | The application was vulnerable to multiple instances of SQL injection (authenticated and unauthenticated) through a vulnerable parameter. Due to the stacked query support, complex SQL commands could be crafted and injected into the vulnerable parameter and using a sleep based inferential SQL injection it was possible to extract data from the database. |
References
History
Mon, 05 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: TML
Published:
Updated: 2025-05-05T18:54:14.037Z
Reserved: 2022-08-30T00:00:00.000Z
Link: CVE-2022-3059
Updated: 2024-08-03T01:00:10.315Z
Status : Modified
Published: 2022-10-31T21:15:12.330
Modified: 2024-11-21T07:18:44.267
Link: CVE-2022-3059
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD