Get a Pentest and security assessment of your IT network.

2021-current

CVE-2020-15849 – Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the

Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application’s database, allowing for authorization bypass and taking over additional accounts by means of modifying password-reset tokens stored in the database. Remote command execution is also possible by leveraging this to abuse the Yii framework’s bizRule functionality, allowing for arbitrary PHP code to be executed by the application. Remote command execution is also possible by using this together with a separate insecure file upload vulnerability (CVE-2020-15488).

 

Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15849

Reference (s):

  • https://labs.f-secure.com/advisories/redesk-v2-3-multiple-issues/
  • https://www.re-desk.com/download-help-desk-software.html
Related posts
2021-current

CVE-2004-1715 - Directory traversal vulnerability in MIMEsweeper for Web before 5.0.4 all

2021-current

CVE-2014-4742 - Cross-site scripting (XSS) vulnerability in system/class_link.php in the

2021-current

CVE-2014-9837 - coders/pnm.c in ImageMagick 6.9.0-1 Beta and earlier allows remote attack

2021-current

CVE-2020-10446 - The way URIs are handled in admin/header.php in Chadha PHPKB Standard Mul