Rukovoditel Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability - CVE-2020-13591
An exploitable SQL injection vulnerability exists in the quotaccess_rules/rules_formquot page of the Rukovoditel Project Management App 2.7.2. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability this can be done either with administrator credentials or through cross-site request forgery.