First published: Wed Dec 22 2021(Updated: )
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech R-SeeNet | =2.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21916 is an SQL injection vulnerability in the 'group_list' page of Advantech R-SeeNet 2.4.15.
CVE-2021-21916 has a severity score of 8.8, which is considered high.
The SQL injection vulnerability in CVE-2021-21916 can be exploited through a specially-crafted HTTP request at the 'description_filter' parameter.
An attacker with authenticated access can exploit CVE-2021-21916 by making HTTP requests.
Yes, it is recommended to update to a fixed version of Advantech R-SeeNet to mitigate the SQL injection vulnerability in CVE-2021-21916.