Vulnerability Description
MapService.svc in Hexagon GeoMedia WebMap 2020 before Update 2 (aka 16.6.2.66) allows blind SQL Injection via the Id (within sourceItems) parameter to the GetMap method.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hexagongeospatial | Geomedia Webmap | < 16.6.2.66 |
Related Weaknesses (CWE)
References
- https://download.hexagongeospatial.com/en/downloads/webgis/geomedia-webmap-2020-Vendor Advisory
- https://www.hexagongeospatial.com/products/power-portfolio/geomedia-webmapProductVendor Advisory
- https://www.silentgrid.com/blog/cve-2021-37749-hexagon-geomedia-webmap-2020-blinExploitThird Party Advisory
- https://download.hexagongeospatial.com/en/downloads/webgis/geomedia-webmap-2020-Vendor Advisory
- https://www.hexagongeospatial.com/products/power-portfolio/geomedia-webmapProductVendor Advisory
- https://www.silentgrid.com/blog/cve-2021-37749-hexagon-geomedia-webmap-2020-blinExploitThird Party Advisory
FAQ
What is CVE-2021-37749?
CVE-2021-37749 is a vulnerability with a CVSS score of 9.8 (CRITICAL). MapService.svc in Hexagon GeoMedia WebMap 2020 before Update 2 (aka 16.6.2.66) allows blind SQL Injection via the Id (within sourceItems) parameter to the GetMap method.
How severe is CVE-2021-37749?
CVE-2021-37749 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-37749?
Check the references section above for vendor advisories and patch information. Affected products include: Hexagongeospatial Geomedia Webmap.