First published: Wed Dec 22 2021(Updated: )
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech R-SeeNet | =2.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21917 is an SQL injection vulnerability in the 'group_list' page of Advantech R-SeeNet 2.4.15.
CVE-2021-21917 has a severity score of 8.8, which is considered high.
Advantech R-SeeNet version 2.4.15 is affected by CVE-2021-21917.
An attacker can exploit CVE-2021-21917 by sending a specially-crafted HTTP request with a malicious 'ord' parameter on the 'group_list' page.
Yes, an attacker needs to be authenticated in order to exploit CVE-2021-21917.