|
Family: CGI abuses --> Category: attack
Comersus BackOffice Administrator Authentication Bypass Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for administrator authentication bypass vulnerability in Comersus BackOffice
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains an ASP application that is prone to a
SQL injection attack.
Description :
The remote host appears to be running Comersus Cart, an ASP shopping
cart application.
The version of Comersus Cart installed on the remote host fails to
sanitize input to the 'adminName' and 'adminpassword' fields of the
'backofficeLite/comersus_backoffice_menu.asp' script before using them
in a database query. An unauthenticated remote attacker can leverage
this issue to bypass authentication and gain administrative access to
the application or launch other attacks against the affected
application and its underlying database.
See also :
http://www.morx.org/comersus.txt
Solution :
Unknown at this time.
Threat Level:
Medium / CVSS Base Score : 5
(AV:R/AC:L/Au:NR/C:P/A:N/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|