This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SQLMgmt class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of the Postgres database.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech WISE-PaaS/RMM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-19-952 is considered high due to the potential for remote attackers to disclose sensitive information.
To fix ZDI-19-952, ensure that your installation of Advantech WISE-Paas/RMM is updated to the latest version provided by the vendor.
Yes, authentication is required to exploit ZDI-19-952, but the existing mechanism can be bypassed.
Attackers can potentially access sensitive information on affected installations of Advantech WISE-PaaS/RMM.
You can determine if you are affected by ZDI-19-952 by checking if you are using an impacted version of Advantech WISE-PaaS/RMM.