|
Family: CGI abuses --> Category: attack
Web Wiz txtUserName Parameter SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for txtUserName Parameter SQL injection vulnerability in Web Wiz products
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server has an ASP application that is affected by a SQL
injection vulnerability.
Description :
The remote host is running an ASP application from Web Wiz, such as
Password Login, Journal, Polls, or Site News.
The installed version of the Web Wiz application fails to validate
user input to the 'txtUserName' parameter of the
'admin/check_user.asp' script before using it in database queries. An
unauthenticated attacker may be able to leverage this issue to bypass
authentication, disclose sensitive information, modify data, or launch
attacks against the underlying database.
See also :
http://www.kapda.ir/advisory-167.html
Solution :
Upgrade to Web Wiz Password Login 1.72 / Journal 1.0.1 / Polls 3.07 /
Site News 3.07 or later.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|