First published: Wed Dec 22 2021(Updated: )
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ord’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech R-SeeNet | =2.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21919 is a vulnerability that can be exploited through a specially-crafted HTTP request leading to SQL injection.
CVE-2021-21919 can be triggered by sending an authenticated HTTP request with a specific 'ord' parameter, allowing an attacker to perform SQL injection.
CVE-2021-21919 has a severity rating of high with a CVSS score of 4.9.
Advantech R-SeeNet version 2.4.15 is affected by CVE-2021-21919.
Yes, the high privilege super-administrator account needs to be used for exploitation without cross-site request forgery attack.
To fix CVE-2021-21919, it is recommended to apply the latest patches or updates provided by Advantech.
You can find more information about CVE-2021-21919 at the following link: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364