First published: Tue Apr 11 2017(Updated: )
Multiple SQL injection vulnerabilities in EyesOfNetwork (aka EON) 5.0 and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) bp_name, (2) display, (3) search, or (4) equipment parameter to module/monitoring_ged/ged_functions.php or the (5) type parameter to monitoring_ged/ajax.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EyesOfNetwork EyesOfNetwork | <=5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6088 is classified as a high severity vulnerability due to its potential to allow remote authenticated users to execute arbitrary SQL commands.
To fix CVE-2017-6088, update EyesOfNetwork to a version later than 5.0 that addresses these SQL injection vulnerabilities.
CVE-2017-6088 affects all versions of EyesOfNetwork up to and including 5.0.
Using CVE-2017-6088, attackers can perform SQL injection attacks that may compromise the database and manipulate or retrieve sensitive data.
Be sure to restrict access to authenticated users only, but the best solution is to upgrade to a patched version of EyesOfNetwork.