Secure 8 (Evalos) does not validate user input data correctly, allowing a remote attacker to perform a Blind SQL Injection. An attacker could exploit this vulnerability in order to extract information of users and administrator accounts stored in the database.
References
Link | Resource |
---|---|
http://titaniumaics.blogspot.com/2021/06/vulnerabilidad-zero-day-en-primion.html | Exploit Third Party Advisory |
https://www.incibe-cert.es/en/early-warning/ics-advisories/primion-digitek-secure-8-sql-injection-vulnerability | Third Party Advisory |
http://titaniumaics.blogspot.com/2021/06/vulnerabilidad-zero-day-en-primion.html | Exploit Third Party Advisory |
https://www.incibe-cert.es/en/early-warning/ics-advisories/primion-digitek-secure-8-sql-injection-vulnerability | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://titaniumaics.blogspot.com/2021/06/vulnerabilidad-zero-day-en-primion.html - Exploit, Third Party Advisory | |
References | () https://www.incibe-cert.es/en/early-warning/ics-advisories/primion-digitek-secure-8-sql-injection-vulnerability - Third Party Advisory |
Information
Published : 2021-06-18 15:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3604
Mitre link : CVE-2021-3604
CVE.ORG link : CVE-2021-3604
JSON object : View
Products Affected
primion-digitek
- secure_8
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')