Vulnerability Description
An issue was discovered in Mods for HESK 3.1.0 through 2019.1.0. A blind time-based SQL injection issue allows remote unauthenticated attackers to retrieve information from the database via a ticket.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mods-For-Hesk | Mods For Hesk | >= 3.1.0, <= 2019.1.0 |
Related Weaknesses (CWE)
References
- https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/ExploitThird Party Advisory
- https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/ExploitThird Party Advisory
FAQ
What is CVE-2020-13993?
CVE-2020-13993 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in Mods for HESK 3.1.0 through 2019.1.0. A blind time-based SQL injection issue allows remote unauthenticated attackers to retrieve information from the database via a ticket.
How severe is CVE-2020-13993?
CVE-2020-13993 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-13993?
Check the references section above for vendor advisories and patch information. Affected products include: Mods-For-Hesk Mods For Hesk.