Learn about CVE-2019-6986, a vulnerability in VIVO Vitro v1.10.0 allowing remote attackers to execute unauthorized SPARQL queries, potentially leading to denial of service (DoS) due to regular expression denial of service (ReDoS). Find mitigation steps and prevention measures.
Vulnerability in VIVO Vitro v1.10.0 allows remote attackers to execute unauthorized SPARQL queries, leading to denial of service (DoS) due to regular expression denial of service (ReDoS).
Understanding CVE-2019-6986
VIVO Vitro v1.10.0 is vulnerable to a SPARQL Injection flaw that can be exploited by attackers to execute unauthorized queries.
What is CVE-2019-6986?
This CVE refers to a vulnerability in VIVO Vitro v1.10.0 that enables remote attackers to perform unauthorized SPARQL queries through the uri parameter, potentially resulting in a denial of service (DoS) due to regular expression denial of service (ReDoS).
The Impact of CVE-2019-6986
The exploitation of this vulnerability can lead to a denial of service (DoS) condition, impacting the availability of the affected system.
Technical Details of CVE-2019-6986
Vulnerability in VIVO Vitro v1.10.0
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Immediate Steps to Take