|
Family: CGI abuses --> Category: attack
MailWatch authenticate Function SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for authentication function SQL injection vulnerability in MailWatch
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is prone to SQL
injection attacks.
Description :
The remote host appears to be running MailWatch, a web-based frontend
to MailScanner written in PHP.
The version of MailWatch installed on the remote host fails to
sanitize the username and password before using them in database
queries in the 'authenticate' function of 'functions.php'. This issue
can be exploited, if PHP's 'magic_quotes' setting is disabled, to
launch SQL injection attacks against the affected application to, for
example, bypass authentication and thereby gain administrative access
to the application.
Solution :
Upgrade to MailWatch 1.0.3 or later.
Threat Level:
Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|