Vulnerability Description
eDirectory contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to bypass administrator authentication and disclose sensitive files by injecting SQL code into parameters. Attackers can exploit the key parameter in the login endpoint with union-based SQL injection to authenticate as administrator, then leverage authenticated file disclosure vulnerabilities in language_file.php to read arbitrary PHP files from the server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Arcasolutions | Edirectory | <= 1.0 |
Related Weaknesses (CWE)
References
- https://www.edirectory.com/Product
- https://www.exploit-db.com/exploits/46423ExploitVDB Entry
- https://www.vulncheck.com/advisories/edirectory-all-versions-sql-injection-autheThird Party Advisory
FAQ
What is CVE-2019-25675?
CVE-2019-25675 is a vulnerability with a CVSS score of 8.2 (HIGH). eDirectory contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to bypass administrator authentication and disclose sensitive files by injecting SQL code into parameter...
How severe is CVE-2019-25675?
CVE-2019-25675 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25675?
Check the references section above for vendor advisories and patch information. Affected products include: Arcasolutions Edirectory.