IBM Rational ClearQuest Username Parameter SQL Injection Vulnerability
BID:25324
Info
IBM Rational ClearQuest Username Parameter SQL Injection Vulnerability
| Bugtraq ID: | 25324 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-4368 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 14 2007 12:00AM |
| Updated: | May 07 2015 05:36PM |
| Credit: | sasquatch and rel1k are credited with the discovery of this vulnerability. |
| Vulnerable: |
IBM Rational ClearQuest 7.0 .1 IBM Rational ClearQuest 7.0 |
| Not Vulnerable: |
IBM Rational ClearQuest 7.0.1 .1 IBM Rational ClearQuest 7.0 .2 |
Discussion
IBM Rational ClearQuest Username Parameter SQL Injection Vulnerability
IBM Rational ClearQuest is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
IBM Rational ClearQuest 7.0.0.0 and 7.0.0.1 are vulnerable; other versions may also be affected.
IBM Rational ClearQuest is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
IBM Rational ClearQuest 7.0.0.0 and 7.0.0.1 are vulnerable; other versions may also be affected.
Exploit / POC
IBM Rational ClearQuest Username Parameter SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example exploit is available:
http://www.example.com/cqweb/main?command=GenerateMainFrame&ratl_userdb=DATABASENAMEHERE,&test=&clientServerAddress=http://www.example.com/cqweb/login&username=[SQL]&password=PASSWORDHERE&schema=SCHEMEAHERE&userDb=DATABASENAMEHERE
Attackers can use a browser to exploit this issue.
The following example exploit is available:
http://www.example.com/cqweb/main?command=GenerateMainFrame&ratl_userdb=DATABASENAMEHERE,&test=&clientServerAddress=http://www.example.com/cqweb/login&username=[SQL]&password=PASSWORDHERE&schema=SCHEMEAHERE&userDb=DATABASENAMEHERE
Solution / Fix
IBM Rational ClearQuest Username Parameter SQL Injection Vulnerability
Solution:
Reportedly, IBM has released patches and new releases to address this issue. Customers should contact the vendor for information on obtaining and applying fixes.
Solution:
Reportedly, IBM has released patches and new releases to address this issue. Customers should contact the vendor for information on obtaining and applying fixes.
References
IBM Rational ClearQuest Username Parameter SQL Injection Vulnerability
References:
References: