First published: Tue Jan 11 2022(Updated: )
A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sysaid On-Premises | =20.4.74-b10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-43971 is high with a severity value of 8.8.
CVE-2021-43971 affects SysAid ITIL version 20.4.74-b10.
The vulnerability in SysAid ITIL version 20.4.74-b10 is a SQL injection vulnerability in /mobile/SelectUsers.jsp.
A remote authenticated attacker can exploit CVE-2021-43971 by executing arbitrary SQL commands via the filterText parameter in /mobile/SelectUsers.jsp.
Yes, you can find references for CVE-2021-43971 in the following links: [1](https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md), [2](https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md), [3](https://www.sysaid.com/it-service-management-software/incident-management).