9.8

CVE-2022-50694

Exploit
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains an SQL injection vulnerability in the 'username' POST parameter of index.php that allows attackers to manipulate database queries. Attackers can inject arbitrary SQL code through the username parameter to bypass authentication and potentially access unauthorized database information.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sound4Impact Firmware Version2.15
   Sound4Impact Version2.0
Sound4Impact Firmware Version1.69
   Sound4Impact Version1.0
Sound4Pulse Firmware Version2.15
   Sound4Pulse Version2.0
Sound4Pulse Firmware Version1.69
   Sound4Pulse Version1.0
Sound4First Firmware Version2.15
   Sound4First Version2.0
Sound4First Firmware Version1.69
   Sound4First Version1.0
Sound4Impact Eco Firmware Version1.16
   Sound4Impact Eco Version-
Sound4Pulse Eco Firmware Version1.16
   Sound4Pulse Eco Version-
Sound4Big Voice4 Firmware Version1.2
   Sound4Big Voice4 Version-
Sound4Big Voice2 Firmware Version1.30
   Sound4Big Voice2 Version-
Sound4Wm2 Firmware Version1.11
   Sound4Wm2 Version-
Sound4Stream Extension Version2.4.29
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.218
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
disclosure@vulncheck.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
disclosure@vulncheck.com 8.8 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.