An API design flaw in Simmeth Lieferantenmanager before 5.6 allows unauthorized access to SQL tables, exposing sensitive user data
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | CVE-2022-44014 | 25 Dec 202205:15 | – | nvd |
![]() | CVE-2022-44014 | 25 Dec 202200:00 | – | cvelist |
![]() | Simmeth System Supplier Manager Design Error Vulnerability | 21 Nov 202200:00 | – | cnvd |
![]() | CVE-2022-44014 | 23 May 202500:09 | – | redhatcve |
![]() | CVE-2022-44014 | 25 Dec 202200:00 | – | vulnrichment |
![]() | Design/Logic Flaw | 25 Dec 202205:15 | – | prion |
![]() | Simmeth System GmbH Supplier Manager LFI / SQL Injection / Bypass Vulnerabilities | 16 Nov 202200:00 | – | zdt |
![]() | Simmeth System GmbH Supplier Manager LFI / SQL Injection / Bypass | 15 Nov 202200:00 | – | packetstorm |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
Credential | request body | /DS/LM_API/api/SelectionService/GetPaggedTab | A faulty API design allows an attacker to fetch arbitrary SQL tables, leaking user passwords and MSSQL hashes. | CWE-284 |
TableFilters | request body | /DS/LM_API/api/SelectionService/GetPaggedTab | A faulty API design allows an attacker to fetch arbitrary SQL tables, leaking user passwords and MSSQL hashes. | CWE-284 |
ImagesPath | request body | /DS/LM_API/api/ConfigurationService/GetImages | The API can be abused to read arbitrary files from the file system due to allowing paths from the frontend. | CWE-284 |
Mandant | request body | /DS/LM_API/api/ConfigurationService/GetConfiguration | The API call returns cleartext SMTP credentials, enabling an attacker to send phishing emails. | CWE-284 |
Columns | request body | /DS/LM_API/api/SelectionService/InsertQueryWithActiveRelationsReturnId | Allows an attacker to store and execute JavaScript code in victims' browsers, leading to XSS. | CWE-79 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo