Skip to content

Plaintext credential usage vulnerability in Sage 200...

Critical severity Unreviewed Published Oct 4, 2023 to the GitHub Advisory Database • Updated Dec 28, 2023

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext.

References

Published by the National Vulnerability Database Oct 4, 2023
Published to the GitHub Advisory Database Oct 4, 2023
Last updated Dec 28, 2023

Severity

Critical

EPSS score

0.399%
(74th percentile)

CVE ID

CVE-2023-2809

GHSA ID

GHSA-3229-mfqx-wc57

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.