CVE-2021-36206

All versions of CEVAS prior to 1.01.46 do not sufficiently validate user-controllable input and could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:johnsoncontrols:cevas:*:*:*:*:*:*:*:*

History

01 Nov 2022, 15:41

Type Values Removed Values Added
CWE CWE-79
First Time Johnsoncontrols
Johnsoncontrols cevas
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References (CERT) https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-05 - (CERT) https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-05 - Third Party Advisory, US Government Resource
References (CONFIRM) https://www.johnsoncontrols.com/cyber-solutions/security-advisories - (CONFIRM) https://www.johnsoncontrols.com/cyber-solutions/security-advisories - Vendor Advisory
CPE cpe:2.3:a:johnsoncontrols:cevas:*:*:*:*:*:*:*:*

28 Oct 2022, 02:33

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-28 02:15

Updated : 2023-12-10 14:35


NVD link : CVE-2021-36206

Mitre link : CVE-2021-36206

CVE.ORG link : CVE-2021-36206


JSON object : View

Products Affected

johnsoncontrols

  • cevas
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')