Lucene search

K
cvelistTalosCVELIST:CVE-2020-13589
HistoryAug 17, 2021 - 7:14 p.m.

CVE-2020-13589

2021-08-1719:14:20
CWE-89
talos
www.cve.org

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

8.9 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%

An exploitable SQL injection vulnerability exists in the ‘entities/fields’ page of the Rukovoditel Project Management App 2.7.2. The entities_id parameter in the 'entities/fields page (mulitple_edit or copy_selected or export function) is vulnerable to authenticated SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability, this can be done either with administrator credentials or through cross-site request forgery.

CNA Affected

[
  {
    "product": "Rukovoditel",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Rukovoditel Project Management App 2.7.2"
      }
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

8.9 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%

Related for CVELIST:CVE-2020-13589