EzASPSite Default.ASP SQL Injection Vulnerability
BID:17309
Info
EzASPSite Default.ASP SQL Injection Vulnerability
| Bugtraq ID: | 17309 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 29 2006 12:00AM |
| Updated: | Mar 29 2006 11:03PM |
| Credit: | Mustafa Can Bjorn is credited with the discovery of this vulnerability. |
| Vulnerable: |
EzASPSite EzASPSite 2.0 RC3 |
| Not Vulnerable: | |
Discussion
EzASPSite Default.ASP SQL Injection Vulnerability
EzASPSite is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
EzASPSite versions 2.0 RC3 and prior are affected by this issue.
EzASPSite is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
EzASPSite versions 2.0 RC3 and prior are affected by this issue.
Exploit / POC
EzASPSite Default.ASP SQL Injection Vulnerability
This issue can be exploited through a web client.
This issue can be exploited through a web client.
Solution / Fix
EzASPSite Default.ASP SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
References
EzASPSite Default.ASP SQL Injection Vulnerability
References:
References:
- EzASPSite Home Page (EzASPSite)
- EzASPSite <= 2.0 RC3 Remote SQL Injection Exploit Vulnerability. ("Mustafa Can Bjorn IPEKCI"
)