This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Connectwise First view 2020-07-07
Product Connectwise Automate Last view 2021-06-17
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:connectwise:connectwise_automate:2019.12:*:*:*:*:*:*:* 2
cpe:2.3:a:connectwise:connectwise_automate:*:*:*:*:*:*:*:* 2

Related : CVE

  Date Alert Description
7.5 2021-06-17 CVE-2021-32582

An issue was discovered in ConnectWise Automate before 2021.5. A blind SQL injection vulnerability exists in core agent inventory communication that can enable an attacker to extract database information or administrative credentials from an instance via crafted monitor status responses.

7.5 2020-07-07 CVE-2020-15008

A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12.

CWE : Common Weakness Enumeration

%idName
100% (2) CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('...