First published: Wed Dec 22 2021(Updated: )
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘company_filter’ parameter with the administrative account or through cross-site request forgery.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech R-SeeNet | =2.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-21923 is high.
CVE-2021-21923 occurs when a specially-crafted HTTP request is made, leading to SQL injection.
The affected software for CVE-2021-21923 is Advantech R-SeeNet version 2.4.15.
An attacker can make authenticated HTTP requests to trigger this vulnerability at the 'company_filter' parameter with the administrative account or through cross-site request forgery.
It is recommended to upgrade to a patched version of Advantech R-SeeNet to fix CVE-2021-21923.