Cyclope Employee Surveillance Solution versions 6.x is vulnerable to a SQL injection flaw in its login mechanism. The username parameter in the auth-login POST request is not properly sanitized, allowing attackers to inject arbitrary SQL statements. This can be leveraged to write and execute a malicious PHP file on disk, resulting in remote code execution under the SYSTEM user context.
Metrics
Affected Vendors & Products
References
History
Fri, 08 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 Aug 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cyclope Employee Surveillance Solution versions 6.x is vulnerable to a SQL injection flaw in its login mechanism. The username parameter in the auth-login POST request is not properly sanitized, allowing attackers to inject arbitrary SQL statements. This can be leveraged to write and execute a malicious PHP file on disk, resulting in remote code execution under the SYSTEM user context. | |
| Title | Cyclope Employee Surveillance Solution v6.x SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-08T18:10:24.982Z
Updated: 2025-08-08T18:59:31.525Z
Reserved: 2025-08-08T14:34:48.697Z
Link: CVE-2012-10047
Updated: 2025-08-08T18:59:18.118Z
Status : Awaiting Analysis
Published: 2025-08-08T19:15:34.750
Modified: 2025-08-08T20:30:18.180
Link: CVE-2012-10047
No data.
ReportizFlow