Emuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-23315 | Emuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host. |
Fixes
Solution
The sql injection vulnerability was fixed by Escaping All User-Supplied Input
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.gov.il/en/departments/faq/cve_advisories |
|
History
Mon, 16 Sep 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Emuse - eServices / eNvoice SQL injection | Emuse - eServices / eNvoice SQL injection |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCD
Published:
Updated: 2024-09-16T18:38:48.510Z
Reserved: 2021-07-12T00:00:00
Link: CVE-2021-36722
No data.
Status : Modified
Published: 2021-12-29T15:15:07.757
Modified: 2024-11-21T06:13:58.780
Link: CVE-2021-36722
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD