Emuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-23315 Emuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host.
Fixes

Solution

The sql injection vulnerability was fixed by Escaping All User-Supplied Input


Workaround

No workaround given by the vendor.

History

Mon, 16 Sep 2024 18:45:00 +0000

Type Values Removed Values Added
Title Emuse - eServices / eNvoice SQL injection Emuse - eServices / eNvoice SQL injection

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCD

Published:

Updated: 2024-09-16T18:38:48.510Z

Reserved: 2021-07-12T00:00:00

Link: CVE-2021-36722

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-29T15:15:07.757

Modified: 2024-11-21T06:13:58.780

Link: CVE-2021-36722

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses