CVE-2020-26805
12.11.2020, 19:15
In Sentrifugo 3.2, admin can edit employee's informations via this endpoint --> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, "employeeNumId" parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database.
Vendor | Product | Version |
---|---|---|
sapplica | sentrifugo | 3.2 |
𝑥
= Vulnerable software versions