Vulnerability Description
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘sn_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Advantech | R-Seenet | 2.4.15 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366ExploitThird Party Advisory
FAQ
What is CVE-2021-21930?
CVE-2021-21930 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘sn_filter’ parameter to trigger this vulnerability. This can be done as any authenticat...
How severe is CVE-2021-21930?
CVE-2021-21930 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-21930?
Check the references section above for vendor advisories and patch information. Affected products include: Advantech R-Seenet.