SiteEnable SQL Injection Vulnerability
BID:12985
Info
SiteEnable SQL Injection Vulnerability
| Bugtraq ID: | 12985 |
| Class: | Input Validation Error |
| CVE: |
CVE-2005-1011 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 02 2005 12:00AM |
| Updated: | Jul 12 2009 11:56AM |
| Credit: | Discovery is credited to Zinho <[email protected]>. |
| Vulnerable: |
Iatek SiteEnable |
| Not Vulnerable: | |
Discussion
SiteEnable SQL Injection Vulnerability
SiteEnable is reported prone to an SQL injection vulnerability.
This vulnerability could permit remote attackers to pass malicious input to database queries, resulting in modification of query logic or other attacks.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
All versions of SiteEnable are considered vulnerable at the moment.
SiteEnable is reported prone to an SQL injection vulnerability.
This vulnerability could permit remote attackers to pass malicious input to database queries, resulting in modification of query logic or other attacks.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
All versions of SiteEnable are considered vulnerable at the moment.
Exploit / POC
SiteEnable SQL Injection Vulnerability
No exploit is required.
The following proof of concept is available:
http://www.example.com/content.asp?do_search=0&keywords=contact&page_no=2&sortby=;SELECT%20* FROM bla bla--
No exploit is required.
The following proof of concept is available:
http://www.example.com/content.asp?do_search=0&keywords=contact&page_no=2&sortby=;SELECT%20* FROM bla bla--
Solution / Fix
SiteEnable SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.