Learn about CVE-2020-15849 affecting Re:Desk 2.3, a SQL injection vulnerability allowing data exposure and remote code execution. Find mitigation steps here.
Re:Desk 2.3 has a blind authenticated SQL injection vulnerability that could lead to sensitive data exposure and remote code execution.
Understanding CVE-2020-15849
Re:Desk 2.3 is affected by a SQL injection vulnerability that can be exploited by an attacker with administrative access to the application.
What is CVE-2020-15849?
The vulnerability exists in the SettingsController class, specifically in the actionEmailTemplates() method. An attacker could exploit this flaw to retrieve sensitive data from the application's database, potentially leading to authorization bypass and compromise of additional accounts. Additionally, the vulnerability allows for remote command execution by abusing the Yii framework's bizRule functionality, enabling the execution of arbitrary PHP code. Combining this vulnerability with another insecure file upload vulnerability (CVE-2020-15488) further exacerbates the risk of remote command execution.
The Impact of CVE-2020-15849
The exploitation of this vulnerability could result in the following consequences:
Technical Details of CVE-2020-15849
Re:Desk 2.3's vulnerability details are as follows:
Vulnerability Description
The blind authenticated SQL injection vulnerability in the SettingsController class allows attackers to extract sensitive data and execute arbitrary PHP code.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by an attacker with administrative access to the application, enabling them to perform SQL injection attacks and execute arbitrary PHP code.
Mitigation and Prevention
To address CVE-2020-15849, the following steps are recommended:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates