Vulnerability Description
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. An attacker without authentication is able to execute arbitrary SQL SELECT statements by injecting the HTTP (POST or GET) parameter persoid into /tools/VamPersonPhoto.php. The SQL Injection type is Error-based (this means that relies on error messages thrown by the database server to obtain information about the structure of the database).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Seling | Visual Access Manager | >= 4.15.0, <= 4.29.0 |
Related Weaknesses (CWE)
References
- https://www.seling.it/Product
- https://www.seling.it/product/vam/ProductVendor Advisory
- https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.htmlExploitThird Party Advisory
- https://www.seling.it/Product
- https://www.seling.it/product/vam/ProductVendor Advisory
- https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.htmlExploitThird Party Advisory
FAQ
What is CVE-2019-19986?
CVE-2019-19986 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. An attacker without authentication is able to execute arbitrary SQL SELECT statements by injecting the HTTP (POST or...
How severe is CVE-2019-19986?
CVE-2019-19986 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-19986?
Check the references section above for vendor advisories and patch information. Affected products include: Seling Visual Access Manager.