Impact
The vulnerability resides in Huace Monitoring and Early Warning System version 2.2 within the ProjectRole.aspx page. Manipulating the ID argument allows an attacker to inject arbitrary SQL statements, potentially gaining unauthorized read or write access to the backend database. This SQL injection can lead to data exposure, alteration, or deletion, compromising confidentiality and integrity of the system’s data.
Affected Systems
Affected is the Huace Monitoring and Early Warning System product produced by Huace, specifically the Web/SysManage/ProjectRole.aspx component used in version 2.2. The exact version number is 2.2; no other affected versions are listed.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium severity vulnerability, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild at the time of assessment. However, the exploit code is publicly available, and the attack can be launched remotely without authentication. The vulnerability is not listed in the CISA KEV catalog, but the combination of remote access and injection capability represents a significant risk to data security.
OpenCVE Enrichment