Description
Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext.
No analysis available yet.
Remediation
Vendor Solution
The vulnerability has been solved by Sage team in the 2023.75 version.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34262 | Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext. |
References
History
No history.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-08-02T06:33:05.522Z
Reserved: 2023-05-19T10:54:17.589Z
Link: CVE-2023-2809
No data.
Status : Modified
Published: 2023-10-04T11:15:10.223
Modified: 2024-11-21T07:59:19.990
Link: CVE-2023-2809
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD