Security for everyone

CVE-2022-1883 Scanner

Detects 'SQL Injection' vulnerability in camptocamp/terraboard affects v. before 2.2.0.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2022-1883 Scanner Detail

Camptocamp/terraboard is an open-source web application designed for visualizing and managing infrastructure state with Terraform. This application provides a user-friendly interface that displays the infrastructure state of a project, enabling users to manipulate and manage their infrastructure easily. Users of Camptocamp/terraboard can view, analyze and compare different versions of infrastructure state. The platform allows users to roll back to previous states in case of any issues with a new version.

CVE-2022-1883 is a serious vulnerability that was detected in Camptocamp/terraboard prior to version 2.2.0. This vulnerability is categorized as an SQL injection, which means an attacker can inject malicious SQL commands into a web application's input fields. These commands can cause unauthorized access to a database, enabling the attacker to read, modify, or delete sensitive data. In the case of Camptocamp/terraboard, a malicious user can use this vulnerability to bypass authentication and access sensitive data on the platform.

When exploited, this vulnerability can lead to severe consequences. It may result in information loss, financial loss, or reputational damage to the organization. Sensitive information stored on the platform may be accessed, modified, or deleted. This type of attack is particularly dangerous because it can be carried out remotely, and attackers don't need to have any specific knowledge of the targeted system.

Thanks to the pro features of, those who read this article can quickly and easily learn about vulnerabilities in their digital assets. The platform provides comprehensive vulnerability scanning, reporting, and remediation features, making it a valuable asset in securing organizations' digital assets. With, users can proactively protect their systems against known vulnerabilities and reduce their exposure to cyber threats.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture