2020-11-12 18:52:40
mitre
PUBLISHED
In Sentrifugo 3.2, admin can edit employees informations via this endpoint --> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, "employeeNumId" parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database.