Description
White Shark System (WSS) 1.3.2 has a SQL injection vulnerability. The vulnerability stems from the default_task_edituser.php files failing to filter the csa_to_user parameter. Remote attackers can exploit the vulnerability to obtain database sensitive information.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-13261 | White Shark System (WSS) 1.3.2 has a SQL injection vulnerability. The vulnerability stems from the default_task_edituser.php files failing to filter the csa_to_user parameter. Remote attackers can exploit the vulnerability to obtain database sensitive information. |
References
| Link | Providers |
|---|---|
| https://github.com/itodaro/WhiteSharkSystem_cve |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:22:24.614Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-20474
No data.
Status : Modified
Published: 2021-06-21T05:15:06.813
Modified: 2024-11-21T05:12:06.480
Link: CVE-2020-20474
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD