Get a Pentest and security assessment of your IT network.

2021-current

CVE-2020-15849 – Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the

Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application’s database, allowing for authorization bypass and taking over additional accounts by means of modifying password-reset tokens stored in the database. Remote command execution is also possible by leveraging this to abuse the Yii framework’s bizRule functionality, allowing for arbitrary PHP code to be executed by the application. Remote command execution is also possible by using this together with a separate insecure file upload vulnerability (CVE-2020-15488).

 

Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15849

Reference (s):

  • https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/
  • https://www.re-desk.com/download-help-desk-software.html
Related posts
2021-current

CVE-2004-1715 - Directory traversal vulnerability in MIMEsweeper for Web before 5.0.4 all

2021-current

CVE-2020-25058 - An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9,

2021-current

CVE-2014-9235 - Multiple SQL injection vulnerabilities in Zoph (aka Zoph Organizes Photos

2021-current

CVE-2020-0828 - A remote code execution vulnerability exists in the way that the ChakraCo