Vulnerability Description
webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webtareas Project | Webtareas | <= 2.4 |
Related Weaknesses (CWE)
References
- https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ExploitThird Party Advisory
- https://n4nj0.github.io/advisories/webtareas-multiple-vulnerabilities-i/ExploitThird Party Advisory
FAQ
What is CVE-2021-41920?
CVE-2021-41920 is a vulnerability with a CVSS score of 7.5 (HIGH). webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ord...
How severe is CVE-2021-41920?
CVE-2021-41920 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41920?
Check the references section above for vendor advisories and patch information. Affected products include: Webtareas Project Webtareas.