Permalink
CVE-2020-37154
7.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
Activity log
- Created suggestion
eLection 2.0 - 'id' SQL Injection
eLection 2.0 contains an authenticated SQL injection vulnerability in the candidate management endpoint that allows attackers to manipulate database queries through the 'id' parameter. Attackers can leverage SQLMap to exploit the vulnerability, potentially gaining remote code execution by uploading backdoor files to the web application directory.
References
-
ExploitDB-48122 exploit
-
eLection Project Vendor Homepage product
-
-
VulnCheck Advisory: eLection 2.0 - 'id' SQL Injection third-party-advisory
Affected products
eLection
- ==2.0
Matching in nixpkgs
pkgs.haskellPackages.selections
Combinators for operating with selections over an underlying functor
pkgs.haskellPackages.cardano-coin-selection
Algorithms for coin selection and fee balancing
-
nixos-unstable 2023-04-20
- nixpkgs-unstable 2023-04-20
- nixos-unstable-small 2023-04-20
-
nixos-25.11 2023-04-20
- nixpkgs-25.11-darwin 2023-04-20
pkgs.python313Packages.colcon-package-selection
Extension for colcon to select the packages to process
pkgs.python314Packages.colcon-package-selection
Extension for colcon to select the packages to process
Package maintainers
-
@Guelakais GueLaKais <koroyeldiores@gmail.com>