Vulnerability Description
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Advantech | R-Seenet | 2.4.15 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364ExploitThird Party Advisory
FAQ
What is CVE-2021-21918?
CVE-2021-21918 is a vulnerability with a CVSS score of 4.9 (MEDIUM). A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter. However, the high privilege super...
How severe is CVE-2021-21918?
CVE-2021-21918 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-21918?
Check the references section above for vendor advisories and patch information. Affected products include: Advantech R-Seenet.