Cayin Digital Signage System xPost 2.5 Code Execution / SQL Injection
Posted by deepcore on June 5, 2020 – 5:23 pm
CAYIN xPost version 2.5 suffers from an unauthenticated SQL injection vulnerability. Input passed via the GET parameter wayfinder_seqid in wayfinder_meeting_input.jsp is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and execute SYSTEM commands.
Post a reply
You must be logged in to post a comment.