An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the ConfigurationServlet endpoint, which listens on TCP port 8080 by default. An unauthenticated remote attacker can craft a special column_value parameter in the setConfiguration action to bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform SQL injection. For example, the attacker can exploit the vulnerability to retrieve the iView admin password.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2022-32 | Exploit Third Party Advisory |
Configurations
History
29 Sep 2022, 16:41
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
References | (MISC) https://www.tenable.com/security/research/tra-2022-32 - Exploit, Third Party Advisory | |
First Time |
Advantech iview
Advantech |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:advantech:iview:5.7.04.6469:*:*:*:*:*:*:* |
27 Sep 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-09-27 23:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-3323
Mitre link : CVE-2022-3323
CVE.ORG link : CVE-2022-3323
JSON object : View
Products Affected
advantech
- iview
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')