CVE-2024-1523
EC-WEB FS-EZViewer(Web) - SQL Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
EC-WEB FS-EZViewer(Web)'s query functionality lacks proper restrictions of user input, allowing remote attackers authenticated as regular user to inject SQL commands for reading, modifying, and deleting database records, as well as executing system commands. Attackers may even leverage the dbo privilege in the database for privilege escalation, elevating their privileges to administrator.
La funcionalidad de consulta de EC-WEB FS-EZViewer(Web) carece de restricciones adecuadas de entrada del usuario, lo que permite a atacantes remotos autenticados como usuarios normales inyectar comandos SQL para leer, modificar y eliminar registros de bases de datos, asà como ejecutar comandos del sistema. Los atacantes pueden incluso aprovechar el privilegio dbo en la base de datos para escalar privilegios, elevando sus privilegios a administrador.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-02-15 CVE Reserved
- 2024-02-15 CVE Published
- 2024-02-15 EPSS Updated
- 2024-08-28 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
- CAPEC-66: SQL Injection
References (1)
URL | Tag | Source |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-7672-7eeac-1.html | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
E-webinformationco Search vendor "E-webinformationco" | Fs-ezviewer Search vendor "E-webinformationco" for product "Fs-ezviewer" | * | - |
Affected
|