Simmeth

Lieferantenmanager

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.26%
  • Veröffentlicht 25.12.2022 05:15:10
  • Zuletzt bearbeitet 15.04.2025 14:15:34

An issue was discovered in /DS/LM_API/api/SelectionService/InsertQueryWithActiveRelationsReturnId in Simmeth Lieferantenmanager before 5.6. An attacker can execute JavaScript code in the browser of the victim if a site is loaded. The victim's encrypt...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 25.12.2022 05:15:10
  • Zuletzt bearbeitet 15.04.2025 14:15:34

An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can make various API calls without authentication because the password in a Credential Object is not checked.

Exploit
  • EPSS 0.34%
  • Veröffentlicht 25.12.2022 05:15:10
  • Zuletzt bearbeitet 15.04.2025 14:15:34

An issue was discovered in Simmeth Lieferantenmanager before 5.6. In the design of the API, a user is inherently able to fetch arbitrary SQL tables. This leaks all user passwords and MSSQL hashes via /DS/LM_API/api/SelectionService/GetPaggedTab.

Exploit
  • EPSS 0.86%
  • Veröffentlicht 25.12.2022 05:15:10
  • Zuletzt bearbeitet 15.04.2025 14:15:34

An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can inject raw SQL queries. By activating MSSQL features, the attacker is able to execute arbitrary commands on the MSSQL server via the xp_cmdshell extended procedure.

Exploit
  • EPSS 0.4%
  • Veröffentlicht 25.12.2022 05:15:10
  • Zuletzt bearbeitet 15.04.2025 14:15:34

An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can download arbitrary files from the web server by abusing an API call: /DS/LM_API/api/ConfigurationService/GetImages with an '"ImagesPath":"C:\\"' value.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 25.12.2022 05:15:10
  • Zuletzt bearbeitet 15.04.2025 14:15:34

An issue was discovered in Simmeth Lieferantenmanager before 5.6. Due to errors in session management, an attacker can log back into a victim's account after the victim logged out - /LMS/LM/#main can be used for this. This is due to the credentials n...