Description
A SQL Injection issue was discovered in webERP 4.15. Payments.php accepts payment data in base64 format. After this is decoded, it is deserialized. Then, this deserialized data goes directly into a SQL query, with no sanitizing checks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://www.exploit-db.com/exploits/47013 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:49:24.684Z
Reserved: 2019-07-04T00:00:00.000Z
Link: CVE-2019-13292
No data.
Status : Modified
Published: 2019-07-04T22:15:10.947
Modified: 2024-11-21T04:24:38.497
Link: CVE-2019-13292
No data.
OpenCVE Enrichment
No data.
Weaknesses