Overview
- Description
- There is a time-based blind SQL injection vulnerability in the Access Manager component before 9.18.040 and 10.x before 10.18.040 in ELO ELOenterprise 9 and 10 and ELOprofessional 9 and 10 that makes it possible to read all database content. The vulnerability exists in the ticket HTTP GET parameter. For example, one can succeed in reading the password hash of the administrator user in the "userdata" table from the "eloam" database.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:elo:access_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCC9362D-AA84-4B87-A374-4C7D94BF4622", "versionEndExcluding": "9.18.040" }, { "criteria": "cpe:2.3:a:elo:access_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BD44860-00BA-42A9-AACB-F767252BB7E5", "versionEndExcluding": "10.18.040", "versionStartExcluding": "10.0.0" } ], "operator": "OR" } ] } ]