Vulnerability Details CVE-2020-10365
LogicalDoc before 8.3.3 allows SQL Injection. LogicalDoc populates the list of available documents by querying the database. This list could be filtered by modifying some of the parameters. Some of them are not properly sanitized which could allow an authenticated attacker to perform arbitrary queries to the database.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 62.5%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.0
Products affected by CVE-2020-10365
-
cpe:2.3:a:logicaldoc:logicaldoc:3.6
-
cpe:2.3:a:logicaldoc:logicaldoc:4
-
cpe:2.3:a:logicaldoc:logicaldoc:4.0.1
-
cpe:2.3:a:logicaldoc:logicaldoc:4.5
-
cpe:2.3:a:logicaldoc:logicaldoc:4.5.2
-
cpe:2.3:a:logicaldoc:logicaldoc:4.6.1
-
cpe:2.3:a:logicaldoc:logicaldoc:5.0.1
-
cpe:2.3:a:logicaldoc:logicaldoc:5.1.2
-
cpe:2.3:a:logicaldoc:logicaldoc:5.2.0
-
cpe:2.3:a:logicaldoc:logicaldoc:5.2.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6
-
cpe:2.3:a:logicaldoc:logicaldoc:6.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.2
-
cpe:2.3:a:logicaldoc:logicaldoc:6.2.4
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3.2
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3.3
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3.4
-
cpe:2.3:a:logicaldoc:logicaldoc:6.3.5
-
cpe:2.3:a:logicaldoc:logicaldoc:6.4
-
cpe:2.3:a:logicaldoc:logicaldoc:6.4.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.4.2
-
cpe:2.3:a:logicaldoc:logicaldoc:6.5
-
cpe:2.3:a:logicaldoc:logicaldoc:6.5.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.5.2
-
cpe:2.3:a:logicaldoc:logicaldoc:6.6
-
cpe:2.3:a:logicaldoc:logicaldoc:6.7
-
cpe:2.3:a:logicaldoc:logicaldoc:6.7.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.7.2
-
cpe:2.3:a:logicaldoc:logicaldoc:6.7.3
-
cpe:2.3:a:logicaldoc:logicaldoc:6.8
-
cpe:2.3:a:logicaldoc:logicaldoc:6.8.1
-
cpe:2.3:a:logicaldoc:logicaldoc:6.8.3
-
cpe:2.3:a:logicaldoc:logicaldoc:6.8.4
-
cpe:2.3:a:logicaldoc:logicaldoc:7
-
cpe:2.3:a:logicaldoc:logicaldoc:7.0.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.1.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.1.2
-
cpe:2.3:a:logicaldoc:logicaldoc:7.1.3
-
cpe:2.3:a:logicaldoc:logicaldoc:7.2
-
cpe:2.3:a:logicaldoc:logicaldoc:7.2.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.4
-
cpe:2.3:a:logicaldoc:logicaldoc:7.4.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.4.2
-
cpe:2.3:a:logicaldoc:logicaldoc:7.4.3
-
cpe:2.3:a:logicaldoc:logicaldoc:7.5
-
cpe:2.3:a:logicaldoc:logicaldoc:7.5.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.5.3
-
cpe:2.3:a:logicaldoc:logicaldoc:7.5.4
-
cpe:2.3:a:logicaldoc:logicaldoc:7.6
-
cpe:2.3:a:logicaldoc:logicaldoc:7.6.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.6.2
-
cpe:2.3:a:logicaldoc:logicaldoc:7.6.3
-
cpe:2.3:a:logicaldoc:logicaldoc:7.6.4
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.1
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.2
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.3
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.4
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.5
-
cpe:2.3:a:logicaldoc:logicaldoc:7.7.6
-
cpe:2.3:a:logicaldoc:logicaldoc:8.0
-
cpe:2.3:a:logicaldoc:logicaldoc:8.1
-
cpe:2.3:a:logicaldoc:logicaldoc:8.1.1
-
cpe:2.3:a:logicaldoc:logicaldoc:8.2.1
-
cpe:2.3:a:logicaldoc:logicaldoc:8.3
-
cpe:2.3:a:logicaldoc:logicaldoc:8.3.0
-
cpe:2.3:a:logicaldoc:logicaldoc:8.3.1