The optional Web Screens feature for Sage 300 through version 2022 uses a hard-coded 40-byte blowfish key ("PASS_KEY") to encrypt and decrypt the database connection string for the PORTAL database found in the "dbconfig.xml". This issue could allow attackers to obtain access to the SQL database.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-44594 | The optional Web Screens feature for Sage 300 through version 2022 uses a hard-coded 40-byte blowfish key ("PASS_KEY") to encrypt and decrypt the database connection string for the PORTAL database found in the "dbconfig.xml". This issue could allow attackers to obtain access to the SQL database. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.sage.com/en-ca/products/sage-300/ |
|
History
Fri, 31 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-31T16:45:01.913Z
Reserved: 2022-09-26T00:00:00.000Z
Link: CVE-2022-41399
Updated: 2024-08-03T12:42:46.396Z
Status : Modified
Published: 2023-04-28T13:15:13.510
Modified: 2025-01-31T17:15:09.690
Link: CVE-2022-41399
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD