First published: Wed Dec 22 2021(Updated: )
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech R-SeeNet | =2.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SQL injection vulnerability is CVE-2021-21915.
The Advantech R-SeeNet version 2.4.15 is affected by this vulnerability.
CVE-2021-21915 has a severity value of 8.8, which is considered high.
An attacker with authenticated access can exploit this vulnerability by sending a specially-crafted HTTP request to the 'group_list' page with a malicious parameter value.
It is recommended to update to a fixed version of Advantech R-SeeNet to address this SQL injection vulnerability.