CVE-2022-46763

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows a low-privileged user to run any SQL commands as if they were the database administrator, potentially leading to unauthorized access or control over the database. It affects TrueConf Server versions 5.2.0.10225 and earlier, and requires that the attacker already has some level of access to the database.

Technical Description

A SQL injection issue in a database stored function in TrueConf Server 5.2.0.10225 (fixed in 5.2.6.10025) allows a low-privileged database user to execute arbitrary SQL commands as the database administrator, resulting in execution of arbitrary code.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade FPatched in 1140 days

Quick Information

Published

Dec 27, 2022

about 3 years ago

Last Modified

Feb 9, 2026

11 days ago

Vendor

trueconf

Product

server