Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15849

EPSS 1.61% · P82
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-15849

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's database, allowing for authorization bypass and taking over additional accounts by means of modifying password-reset tokens stored in the database. Remote command execution is also possible by leveraging this to abuse the Yii framework's bizRule functionality, allowing for arbitrary PHP code to be executed by the application. Remote command execution is also possible by using this together with a separate insecure file upload vulnerability (CVE-2020-15488).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
desk2.3 SettingsController SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Desk是个人开发者的一款写作,博客和记笔记应用。 desk2.3 SettingsController类存在SQL注入漏洞。该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-15849

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-15849

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-09-30 · 45 CVEs total

CVE-2020-261607.5 HIGHjwt-go 安全漏洞
CVE-2020-14375Ubuntu DPDK 代码问题漏洞
CVE-2020-13951Apache OpenMeetings 安全漏洞
CVE-2020-25816HashiCorp Vault和Vault Enterprise 安全漏洞
CVE-2020-25830MantisBT 跨站脚本漏洞
CVE-2020-12870RainbowFish PacsOne Server SQL注入漏洞
CVE-2020-12715RainbowFish PacsOne Server 代码问题漏洞
CVE-2020-13952Apache Superset 安全漏洞
CVE-2020-12869RainbowFish PacsOne Server 跨站脚本漏洞
CVE-2020-25781MantisBT 安全漏洞
CVE-2020-14376Ubuntu DPDK 缓冲区错误漏洞
CVE-2020-14374Ubuntu DPDK copy_data安全漏洞
CVE-2020-15488desk 代码问题漏洞
CVE-2020-15487Desk SQL注入漏洞
CVE-2020-19676Nacos 信息泄露漏洞
CVE-2020-24721Google Apple GAEN 安全漏洞
CVE-2020-19672Niushop B2B2C 代码问题漏洞
CVE-2019-18991Qualcomm 芯片和D-Link DWR-116授权问题漏洞
CVE-2019-18990多款 Realtek 授权问题漏洞
CVE-2019-18989Mediatek MT7620N 授权问题漏洞

Showing top 20 of 45 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-15849

No comments yet


Leave a comment