Virtual Access Monitor Multiple Unspecified SQL Injection Vulnerabilities
BID:58816
Info
Virtual Access Monitor Multiple Unspecified SQL Injection Vulnerabilities
| Bugtraq ID: | 58816 |
| Class: | Input Validation Error |
| CVE: |
CVE-2013-3533 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 02 2013 12:00AM |
| Updated: | May 22 2013 07:43PM |
| Credit: | Ken Wolstencroft of NCC Group |
| Vulnerable: | |
| Not Vulnerable: | |
Discussion
Virtual Access Monitor Multiple Unspecified SQL Injection Vulnerabilities
Virtual Access Monitor is prone to multiple unspecified SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
Virtual Access Monitor 3.10.17 and prior versions are vulnerable.
Virtual Access Monitor is prone to multiple unspecified SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
Virtual Access Monitor 3.10.17 and prior versions are vulnerable.
Exploit / POC
Virtual Access Monitor Multiple Unspecified SQL Injection Vulnerabilities
Attackers can use a browser to exploit these issues.
Attackers can use a browser to exploit these issues.
Solution / Fix
Virtual Access Monitor Multiple Unspecified SQL Injection Vulnerabilities
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Virtual Access Monitor Multiple Unspecified SQL Injection Vulnerabilities
References:
References: