7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
48.3%
Enspire eClient contains a SQL injection vulnerability that could allow an attacker to bypass authentication and access the system with administrative privileges.
The Enspire software suite includes an eClient web front-end which is susceptible to SQL injection attacks. This can be used to perform an authentication bypass or interact with the back-end database. Depending on the configuration this can lead to the compromise of the underlying host itself. Enspire version 7.3.2.7 and eClient version 7.3.2.3 are reported to be affected. Other versions may also be affected.
An attacker with network access to the Enspire eClient web interface could access the system with administrative privileges and potentially compromise the underlying host.
We are currently unaware of an available solution to this problem.
Restrict access
Restrict access to the Enspire eClient web interface to trusted users and networks.
402731
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: October 17, 2011 Updated: October 24, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
<http://www.dimasys.com/index.cfm?page=ENSPIRE>
Thanks to Alastair Gray of Graycon Group for reporting this vulnerability.
This document was written by Michael Orlando.
CVE IDs: | CVE-2011-1915 |
---|---|
Severity Metric: | 1.76 Date Public: |