First published: Wed Dec 22 2021(Updated: )
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘loc_filter’ parameter.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech R-SeeNet | =2.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-21927.
CVE-2021-21927 has a severity rating of 6.5 (high).
An attacker can exploit CVE-2021-21927 by sending a specially-crafted HTTP request to trigger SQL injection.
Any authenticated user or through cross-site request forgery can be targeted by an attacker exploiting CVE-2021-21927.
The vendor may have released a fix for CVE-2021-21927. It is recommended to check with the vendor or apply any available patches or updates.