First published: Wed Sep 12 2018(Updated: )
An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The employee and sort_order parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
ERPNext | =10.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3883 is classified as a critical vulnerability due to its potential for data compromise through SQL injection.
To address CVE-2018-3883, upgrade ERPNext to the latest version that resolves SQL injection issues.
CVE-2018-3883 specifically affects ERPNext version 10.1.6.
If exploited, CVE-2018-3883 can lead to unauthorized access and manipulation of the database contents due to SQL injection.
Organizations using ERPNext version 10.1.6 are at risk of CVE-2018-3883 if they do not apply the necessary security patches.