First published: Wed Nov 01 2017(Updated: )
SecurityCenter versions 5.5.0, 5.5.1 and 5.5.2 contain a SQL Injection vulnerability that could be exploited by an authenticated user with sufficient privileges to run diagnostic scans. An attacker could exploit this vulnerability by entering a crafted SQL query into the password field of a diagnostic scan within SecurityCenter. Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable SecurityCenter | =5.5.0 | |
Tenable SecurityCenter | =5.5.1 | |
Tenable SecurityCenter | =5.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11508 is classified as a medium severity vulnerability due to its potential exploitation by authenticated users.
To fix CVE-2017-11508, upgrade your Tenable SecurityCenter to a version beyond 5.5.2 that includes the necessary security patches.
CVE-2017-11508 allows an attacker to exploit a SQL Injection vulnerability by entering crafted SQL queries into the password field.
CVE-2017-11508 affects users of Tenable SecurityCenter versions 5.5.0, 5.5.1, and 5.5.2.
The implications of CVE-2017-11508 include unauthorized access to sensitive data and the ability to execute arbitrary SQL commands.