An issue was discovered in EyesOfNetwork 5.3. The EyesOfNetwork API 2.4.2 is prone to SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the username field to getApiKey in include/api_functions.php.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry | 
| http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html | Exploit Third Party Advisory VDB Entry | 
| https://github.com/EyesOfNetworkCommunity/eonapi/issues/16 | Third Party Advisory | 
| http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry | 
| http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html | Exploit Third Party Advisory VDB Entry | 
| https://github.com/EyesOfNetworkCommunity/eonapi/issues/16 | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2020-02-07 00:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8656
Mitre link : CVE-2020-8656
CVE.ORG link : CVE-2020-8656
JSON object : View
Products Affected
                eyesofnetwork
- eyesofnetwork
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
