CVE-2021-38391
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A Blind SQL injection vulnerability exists in the /DataHandler/AM/AM_Handler.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter type before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.
Se presenta una vulnerabilidad de inyección SQL ciega en el endpoint /DataHandler/AM/AM_Handler.ashx de Delta Electronics DIAEnergie versión 1.7.5 y anteriores. La aplicación no comprueba apropiadamente el valor controlado por el usuario suministrado mediante el parámetro type antes de usarlo como parte de una consulta SQL. Un atacante remoto no autenticado puede aprovechar este problema para ejecutar código arbitrario en el contexto de NT SERVICE\MSSQLSERVER.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-08-10 CVE Reserved
- 2021-08-30 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-238-03 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Deltaww Search vendor "Deltaww" | Diaenergie Search vendor "Deltaww" for product "Diaenergie" | <= 1.7.5 Search vendor "Deltaww" for product "Diaenergie" and version " <= 1.7.5" | - |
Affected
|