CNVD-2017-20973

Vulnerability from cnvd - Published: 2017-08-15
VLAI Severity ?
Title
Intercom MaLion for Windows and Mac SQL注入漏洞
Description
Intercom MaLion for Windows和MaLion for Mac都是日本Intercom公司的产品。Intercom MaLion for Windows是一款基于Windows平台的IT资产管理解决方案。MaLion for Mac是基于Mac平台的版本。 基于Windows和Mac平台的Intercom MaLion 5.0.0版本至5.2.1版本中存在SQL注入漏洞。远程攻击者可借助Relay Service Server利用该漏洞执行任意的SQL命令。
Severity
Patch Name
Intercom MaLion for Windows and Mac SQL注入漏洞的补丁
Patch Description
Intercom MaLion for Windows和MaLion for Mac都是日本Intercom公司的产品。Intercom MaLion for Windows是一款基于Windows平台的IT资产管理解决方案。MaLion for Mac是基于Mac平台的版本。 基于Windows和Mac平台的Intercom MaLion 5.0.0版本至5.2.1版本中存在SQL注入漏洞。远程攻击者可借助Relay Service Server利用该漏洞执行任意的SQL命令。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布漏洞修复程序,请及时关注更新: https://jvn.jp/en/vu/JVNVU91587298/index.html

Reference
https://jvn.jp/en/vu/JVNVU91587298/index.html
Impacted products
Name
Intercom MaLion for Windows and Mac >=5.0.0,<=5.2.1
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-10816"
    }
  },
  "description": "Intercom MaLion for Windows\u548cMaLion for Mac\u90fd\u662f\u65e5\u672cIntercom\u516c\u53f8\u7684\u4ea7\u54c1\u3002Intercom MaLion for Windows\u662f\u4e00\u6b3e\u57fa\u4e8eWindows\u5e73\u53f0\u7684IT\u8d44\u4ea7\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002MaLion for Mac\u662f\u57fa\u4e8eMac\u5e73\u53f0\u7684\u7248\u672c\u3002\r\n\r\n\u57fa\u4e8eWindows\u548cMac\u5e73\u53f0\u7684Intercom MaLion 5.0.0\u7248\u672c\u81f35.2.1\u7248\u672c\u4e2d\u5b58\u5728SQL\u6ce8\u5165\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9Relay Service Server\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u7684SQL\u547d\u4ee4\u3002",
  "discovererName": "Muneaki Nishimura of of Recruit Technologies Co.,Ltd. RED TEAM",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://jvn.jp/en/vu/JVNVU91587298/index.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-20973",
  "openTime": "2017-08-15",
  "patchDescription": "Intercom MaLion for Windows\u548cMaLion for Mac\u90fd\u662f\u65e5\u672cIntercom\u516c\u53f8\u7684\u4ea7\u54c1\u3002Intercom MaLion for Windows\u662f\u4e00\u6b3e\u57fa\u4e8eWindows\u5e73\u53f0\u7684IT\u8d44\u4ea7\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002MaLion for Mac\u662f\u57fa\u4e8eMac\u5e73\u53f0\u7684\u7248\u672c\u3002\r\n\r\n\u57fa\u4e8eWindows\u548cMac\u5e73\u53f0\u7684Intercom MaLion 5.0.0\u7248\u672c\u81f35.2.1\u7248\u672c\u4e2d\u5b58\u5728SQL\u6ce8\u5165\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9Relay Service Server\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u7684SQL\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Intercom MaLion for Windows and Mac SQL\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Intercom MaLion for Windows and Mac \u003e=5.0.0\uff0c\u003c=5.2.1"
  },
  "referenceLink": "https://jvn.jp/en/vu/JVNVU91587298/index.html",
  "serverity": "\u9ad8",
  "submitTime": "2017-08-07",
  "title": "Intercom MaLion for Windows and Mac SQL\u6ce8\u5165\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…