First published: Thu Oct 29 2020(Updated: )
An issue was discovered in EyesOfNetwork eonweb 5.3-7 through 5.3-8. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to exploit the username_available function of the includes/functions.php file (which is called by login.php).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EyesOfNetwork EyesOfNetwork | >=5.3-7<=5.3-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27886 is classified as a high severity vulnerability due to its ability to allow unauthenticated SQL injection attacks.
To fix CVE-2020-27886, update the EyesOfNetwork eonweb to version 5.3-9 or later to mitigate the SQL injection vulnerability.
CVE-2020-27886 affects EyesOfNetwork eonweb versions 5.3-7 through 5.3-8.
Yes, CVE-2020-27886 can be exploited remotely by an unauthenticated attacker through the web interface.
CVE-2020-27886 is a SQL injection vulnerability that allows attackers to manipulate database queries.