This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SQLMgmt class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of the Postgres database.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WISE-PaaS/RMM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-19-937 is considered high due to the potential for sensitive information disclosure and the ability to bypass authentication.
To mitigate ZDI-19-937, it is recommended to apply the latest security patches provided by Advantech for the WISE-PaaS/RMM product.
ZDI-19-937 can be exploited by remote attackers who can bypass authentication to disclose sensitive information.
Yes, while authentication is required to access the system, the vulnerability allows for the existing authentication mechanism to be bypassed.
Specific versions of Advantech WISE-PaaS/RMM are affected; check the advisories from Advantech for detailed version information.