First published: Mon Jun 08 2015(Updated: )
Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sysaid On-Premises | <=15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2999 includes multiple SQL injection vulnerabilities that allow remote administrators to execute arbitrary SQL commands through specific parameters in SysAid Help Desk.
CVE-2015-2999 affects SysAid Help Desk versions prior to 15.2, specifically those up to version 15.1.
To mitigate CVE-2015-2999 vulnerabilities, it's recommended to upgrade to SysAid Help Desk version 15.2 or later.
Yes, CVE-2015-2999 can be exploited remotely by sending malicious SQL queries through the affected parameters.
CVE-2015-2999 can lead to unauthorized access to the database, data leakage, or manipulation of the database contents.