Sapplica

Sentrifugo

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.12%
  • Veröffentlicht 28.11.2023 00:15:07
  • Zuletzt bearbeitet 21.11.2024 07:57:30

In Sentrifugo 3.5, the AssetsController::uploadsaveAction function allows an authenticated attacker to upload any file without extension filtering.

  • EPSS 0.33%
  • Veröffentlicht 30.12.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:22:40

Sentrifugo 3.2 allows Stored Cross-Site Scripting (XSS) vulnerability by inserting a payload within the X-Forwarded-For HTTP header during the login process. When an administrator looks at logs, the payload is executed. NOTE: This vulnerability only ...

Exploit
  • EPSS 0.53%
  • Veröffentlicht 12.11.2020 19:15:15
  • Zuletzt bearbeitet 21.11.2024 05:20:18

In Sentrifugo 3.2, admin can edit employee's informations via this endpoint --> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, "employeeNumId" parameter is affected by SQLi vulnerability. Attacker can inject SQL comma...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 12.11.2020 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:20:18

In Sentrifugo 3.2, users can share an announcement under "Organization -> Announcements" tab. Also, in this page, users can upload attachments with the shared announcements. This "Upload Attachment" functionality is suffered from "Unrestricted File U...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 12.11.2020 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:20:18

In Sentrifugo 3.2, users can upload an image under "Assets -> Add" tab. This "Upload Images" functionality is suffered from "Unrestricted File Upload" vulnerability so attacker can upload malicious files using this functionality and control the serve...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 13.03.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 04:54:59

A Blind SQL Injection issue was discovered in Sapplica Sentrifugo 3.2 via the index.php/holidaygroups/add id parameter because of the HolidaydatesController.php addAction function.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 06.09.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:58

Sentrifugo 3.2 lacks CSRF protection. This could lead to an attacker tricking the administrator into executing arbitrary code at index.php/dashboard/viewprofile via a crafted HTML page.

Exploit
  • EPSS 0.26%
  • Veröffentlicht 28.08.2018 19:29:17
  • Zuletzt bearbeitet 21.11.2024 03:51:37

A SQL Injection issue was discovered in Sentrifugo 3.2 via the deptid parameter.