First published: Fri Nov 22 2024(Updated: )
Advantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ConfigurationServlet servlet, which listens on TCP port 8080 by default. When parsing the column_value element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-17863.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech iView | ||
Advantech iView | <5.7.04.6752 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52335 is classified as a high severity vulnerability due to its potential for remote exploitation and information disclosure.
To mitigate CVE-2023-52335, it is recommended to update Advantech iView to the latest version that addresses this vulnerability.
CVE-2023-52335 allows attackers to disclose sensitive information from affected installations of Advantech iView.
No, authentication is not required to exploit CVE-2023-52335, making it particularly dangerous.
The impact of CVE-2023-52335 includes unauthorized access to sensitive information, which can compromise system integrity and confidentiality.