Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

MailWatch authenticate Function SQL Injection Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for authentication function SQL injection vulnerability in MailWatch

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP application that is prone to SQL
injection attacks.

Description :

The remote host appears to be running MailWatch, a web-based frontend
to MailScanner written in PHP.

The version of MailWatch installed on the remote host fails to
sanitize the username and password before using them in database
queries in the 'authenticate' function of 'functions.php'. This issue
can be exploited, if PHP's 'magic_quotes' setting is disabled, to
launch SQL injection attacks against the affected application to, for
example, bypass authentication and thereby gain administrative access
to the application.

Solution :

Upgrade to MailWatch 1.0.3 or later.

Threat Level:

Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.