First published: Wed Sep 12 2018(Updated: )
An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The sort_by and start parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
ERPNext | =10.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3884 is considered a critical severity vulnerability due to its potential for SQL injection and data compromise.
To fix CVE-2018-3884, upgrade ERPNext to version 10.1.7 or later, where the vulnerability has been patched.
CVE-2018-3884 is associated with SQL injection attacks which can manipulate database queries through crafted web requests.
CVE-2018-3884 affects ERPNext version 10.1.6 and possibly earlier versions.
Yes, exploitation of CVE-2018-3884 can lead to unauthorized access and compromise of sensitive data within the ERPNext application.