First published: Wed Jul 06 2022(Updated: )
Command Centre Server is vulnerable to SQL Injection via Windows Registry settings for date fields on the server. The Windows Registry setting allows an attacker using the Visitor Management Kiosk, an application designed for public use, to invoke an arbitrary SQL query that has been preloaded into the registry of the Windows Server to obtain sensitive information. This issue affects: Gallagher Command Centre 8.60 versions prior to 8.60.1652; 8.50 versions prior to 8.50.2245; 8.40 versions prior to 8.40.2216; 8.30 versions prior to 8.30.1470; version 8.20 and prior versions.
Credit: disclosures@gallagher.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gallagher Command Centre | <=8.20 | |
Gallagher Command Centre | >=8.30<8.30.1470 | |
Gallagher Command Centre | >=8.40<8.40.2216 | |
Gallagher Command Centre | >=8.50<8.50.2245 | |
Gallagher Command Centre | >=8.60<8.60.1652 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26348 has been classified with a moderate severity due to the potential for SQL injection attacks.
To fix CVE-2022-26348, upgrade to a version of Gallagher Command Centre that is above 8.20 or implement appropriate security measures to mitigate SQL injection.
CVE-2022-26348 allows an attacker to execute arbitrary SQL queries on the Command Centre Server, compromising data integrity.
CVE-2022-26348 affects Gallagher Command Centre versions up to and including 8.20, and specific versions ranging from 8.30 to 8.60.
Organizations using affected versions of the Gallagher Command Centre software are at risk from CVE-2022-26348 if they utilize the Visitor Management Kiosk.