fkie_cve-2019-11678
Vulnerability from fkie_nvd
Published
2019-05-02 14:29
Modified
2024-11-21 04:21
Severity ?
Summary
The "default reports" feature in Zoho ManageEngine Firewall Analyzer before 12.3 Build 123218 is vulnerable to SQL Injection.
Impacted products
Vendor Product Version
zohocorp manageengine_firewall_analyzer 7.2
zohocorp manageengine_firewall_analyzer 7.2
zohocorp manageengine_firewall_analyzer 7.4
zohocorp manageengine_firewall_analyzer 7.6
zohocorp manageengine_firewall_analyzer 8.0
zohocorp manageengine_firewall_analyzer 8.1
zohocorp manageengine_firewall_analyzer 8.3
zohocorp manageengine_firewall_analyzer 8.5
zohocorp manageengine_firewall_analyzer 12.0
zohocorp manageengine_firewall_analyzer 12.2
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3
zohocorp manageengine_firewall_analyzer 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:7.2:7020:*:*:*:*:*:*",
              "matchCriteriaId": "1C465655-9FF6-45EF-876B-B670223EC245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:7.2:7021:*:*:*:*:*:*",
              "matchCriteriaId": "9900A891-8274-460B-9FAA-6D1CC7AEA8FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:7.4:7400:*:*:*:*:*:*",
              "matchCriteriaId": "07341833-8814-4D99-A1A5-932AB1496708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:7.6:7600:*:*:*:*:*:*",
              "matchCriteriaId": "B3933FFA-281D-4460-BD8C-9D77E4B6F0BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:8.0:8000:*:*:*:*:*:*",
              "matchCriteriaId": "528F07A1-83DA-456B-BE01-8CBABF889469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:8.1:8110:*:*:*:*:*:*",
              "matchCriteriaId": "6E28312A-1457-4537-BED1-C6C5D1F26F68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:8.3:8300:*:*:*:*:*:*",
              "matchCriteriaId": "A4556D83-1A50-4CEA-826C-58AA89039357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:8.5:8500:*:*:*:*:*:*",
              "matchCriteriaId": "FEA5DB57-5744-41A2-8EC8-33EE22891A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.0:12000:*:*:*:*:*:*",
              "matchCriteriaId": "D360B311-54CF-4E47-B070-00399CDBB4E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.2:12200:*:*:*:*:*:*",
              "matchCriteriaId": "05955BD9-919D-4088-BD16-0C3BB81F354B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:12300:*:*:*:*:*:*",
              "matchCriteriaId": "81B8FDD7-F9D1-46CD-8DAF-4AE3DF0C0AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123008:*:*:*:*:*:*",
              "matchCriteriaId": "9081E91C-CDC5-4C3B-AB32-7832D4B110A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123027:*:*:*:*:*:*",
              "matchCriteriaId": "2360E0BD-DD1B-4D0C-B97E-7015F71B39C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123045:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E778-45DA-4A8A-819F-192763A137B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123057:*:*:*:*:*:*",
              "matchCriteriaId": "385A0E50-118E-43BC-80C3-3532E8B144D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123064:*:*:*:*:*:*",
              "matchCriteriaId": "BB231123-A1F0-420D-AD66-051FFC936C18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123070:*:*:*:*:*:*",
              "matchCriteriaId": "DD4E9148-80B7-4121-8827-2A873A48E040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123083:*:*:*:*:*:*",
              "matchCriteriaId": "F76D8693-A406-4F40-A2B4-4A477CBD65A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123092:*:*:*:*:*:*",
              "matchCriteriaId": "ED36374B-859F-4FF7-98A5-C22421806DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123126:*:*:*:*:*:*",
              "matchCriteriaId": "0891FD87-6F96-4CFD-B6B5-B51CF45109CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123129:*:*:*:*:*:*",
              "matchCriteriaId": "60858CC9-0E20-45EE-855B-871671ADE6E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123137:*:*:*:*:*:*",
              "matchCriteriaId": "C471D32E-3A66-4017-A0AA-7B14CC4FEFC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123151:*:*:*:*:*:*",
              "matchCriteriaId": "2B2BDD2D-8352-4F60-A451-5F83CC562F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123156:*:*:*:*:*:*",
              "matchCriteriaId": "92B2C256-A795-487D-A4EF-C7278318B1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123164:*:*:*:*:*:*",
              "matchCriteriaId": "75090023-C48A-4BDE-92D2-93A385984FF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123169:*:*:*:*:*:*",
              "matchCriteriaId": "6F267516-9809-44A0-93C9-A571FA9F311F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123177:*:*:*:*:*:*",
              "matchCriteriaId": "D503F7F5-F815-4137-B4E2-29F54C11D148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123182:*:*:*:*:*:*",
              "matchCriteriaId": "F047CFCA-FA01-4DD5-BBF7-5A1A2FA0E027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123185:*:*:*:*:*:*",
              "matchCriteriaId": "E4EB5FB9-AB05-440A-9BAE-1284C5B55D08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123186:*:*:*:*:*:*",
              "matchCriteriaId": "D3B7161C-5566-4205-884A-4E958B6458E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123194:*:*:*:*:*:*",
              "matchCriteriaId": "190F1D92-0C26-479B-83BF-6FA89D6B6DD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123197:*:*:*:*:*:*",
              "matchCriteriaId": "5022F4A5-DBAC-4A56-B49B-91C7E3917022",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:12.3:123208:*:*:*:*:*:*",
              "matchCriteriaId": "CB2EA352-2FF8-42A8-A3A8-1FC1139C8A34",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The \"default reports\" feature in Zoho ManageEngine Firewall Analyzer before 12.3 Build 123218 is vulnerable to SQL Injection."
    },
    {
      "lang": "es",
      "value": "La caracter\u00edstica de \"default reports\" en Zoho ManageEngine Firewall Analyzer versiones anteriores a 12.3 Build 123218 es vulnerable a la inyecci\u00f3n SQL."
    }
  ],
  "id": "CVE-2019-11678",
  "lastModified": "2024-11-21T04:21:34.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-02T14:29:00.450",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/products/firewall/release-notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.manageengine.com/products/firewall/release-notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.