Description
The VeloCloud Orchestrator does not apply correct input validation which allows for blind SQL-injection. A malicious actor with tenant access to Velocloud Orchestrator could enter specially crafted SQL queries and obtain data to which they are not privileged.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-25238 | The VeloCloud Orchestrator does not apply correct input validation which allows for blind SQL-injection. A malicious actor with tenant access to Velocloud Orchestrator could enter specially crafted SQL queries and obtain data to which they are not privileged. |
References
History
No history.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2024-08-04T07:52:20.505Z
Reserved: 2019-12-30T00:00:00.000Z
Link: CVE-2020-3973
No data.
Status : Modified
Published: 2020-07-08T14:15:10.413
Modified: 2024-11-21T05:32:05.560
Link: CVE-2020-3973
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD