CVE-2015-20120
Published: 16 March 2026
Summary
CVE-2015-20120 is a high-severity SQL Injection (CWE-89) vulnerability in Nextclickventures Realtyscript. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates all application parameters to prevent time-based blind SQL injection payloads from being executed against the database.
Remediates the specific SQL injection flaws in RealtyScript 4.0.2 through timely patching or code corrections to eliminate vulnerable parameters.
Deploys web application firewalls at system boundaries to inspect and block crafted HTTP requests containing SQL injection payloads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a SQL injection in a public-facing web application (T1190), enabling unauthenticated remote attackers to extract sensitive database information including credentials and user data (T1213.006).
NVD Description
Next Click Ventures RealtyScript 4.0.2 contains multiple time-based blind SQL injection vulnerabilities that allow unauthenticated attackers to extract database information by injecting SQL code into application parameters. Attackers can craft requests with time-delay payloads to infer database contents character by…
more
character based on response timing differences.
Deeper analysisAI
CVE-2015-20120 affects Next Click Ventures RealtyScript 4.0.2 and consists of multiple time-based blind SQL injection vulnerabilities (CWE-89). These flaws exist in application parameters, where attackers can inject SQL code to extract database information. The vulnerability enables inference of data through crafted requests using time-delay payloads, with responses revealing contents character by character based on timing differences. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).
Unauthenticated attackers can exploit these vulnerabilities remotely over the network with low attack complexity, requiring no privileges or user interaction. Exploitation involves sending specially crafted HTTP requests to affected parameters, observing response delays to exfiltrate sensitive database information such as credentials, user data, or configuration details. This results in high confidentiality impact by disclosing database contents and low integrity impact through potential minor data manipulation, while availability remains unaffected.
Advisories detailing the vulnerabilities and proof-of-concept exploits are available at https://www.exploit-db.com/exploits/38497, https://www.vulncheck.com/advisories/realtyscript-multiple-time-based-blind-sql-injection, and https://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5270.php. These resources provide further technical details on affected endpoints and exploitation techniques, though no vendor patches are referenced in the CVE publication dated 2026-03-16.
Details
- CWE(s)