Vulnerability Description
ResourceSpace 8.6 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the keywords parameter in collection_edit.php. Attackers can submit POST requests with crafted SQL payloads in the keywords field to extract sensitive database information including schema names, user credentials, and other confidential data.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Montala | Resourcespace | 8.6 |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/46274ExploitVDB Entry
- https://www.resourcespace.com/Product
- https://www.resourcespace.com/getProduct
- https://www.vulncheck.com/advisories/resourcespace-sql-injection-via-collection-Third Party Advisory
FAQ
What is CVE-2019-25693?
CVE-2019-25693 is a vulnerability with a CVSS score of 7.1 (HIGH). ResourceSpace 8.6 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the keywords parameter in collection_...
How severe is CVE-2019-25693?
CVE-2019-25693 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25693?
Check the references section above for vendor advisories and patch information. Affected products include: Montala Resourcespace.