{"id": "EDB-ID:32212", "hash": "e426252ee3ed7607db25c471eadccd22", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Procentia IntelliPen 1.1.12.1520 Data.aspx, value param - Blind SQL Injection", "description": "Procentia IntelliPen 1.1.12.1520 (Data.aspx, value param) - Blind SQL Injection. CVE-2014-2043. Webapps exploit for asp platform", "published": "2014-03-12T00:00:00", "modified": "2014-03-12T00:00:00", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/32212/", "reporter": "Portcullis", "references": [], "cvelist": ["CVE-2014-2043"], "lastseen": "2016-02-03T16:26:53", "history": [], "viewCount": 2, "enchantments": {"score": {"value": 6.8, "vector": "NONE", "modified": "2016-02-03T16:26:53"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-2043"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:30644", "SECURITYVULNS:VULN:13733"]}, {"type": "zdt", "idList": ["1337DAY-ID-22019"]}, {"type": "seebug", "idList": ["SSV:85511"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:125684"]}], "modified": "2016-02-03T16:26:53"}, "vulnersScore": 6.8}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/32212/", "sourceData": "CVE: \tCVE-2014-2043\r\nVendor: \tProcentia\r\nProduct: \tIntelliPen\r\nAffected version: \t1.1.12.1520\r\nFixed version: \t1.1.18.1658\r\nReported by: \tJerzy Kramarz\r\nDetails:\r\n\r\nSQL injection has been found and confirmed within the software as an authenticated user. A successful attack could allow an authenticated attacker to access information such as usernames and password hashes that are stored in the database.\r\n\r\nThe following URL and parameters have been confirmed to suffer from Blind SQL injection.\r\n\r\nhttp[s]://<host>/Resources/System/Templates/Data.aspx?DocID=1&field=JobID&value=1<SQL INJECTION>&JobID=1&ParentDocID=1694&InTab=1&ParentKey=JobNumber&NoStore=1&Popup=1\r\n\r\nThis vulnerability exists because \u2018value\u2019 variable is not sanitised before it is used as part of an SQL query to retrived specific job information.\r\nImpact:\r\n\r\nAn attacker would be able to exfiltrate the database, user credentials and in certain setup access the underling operating system.\r\nExploit:\r\n\r\nExploit code is not required.\r\nVendor status:\r\n07/01/2014 \tAdvisory created\r\n16/01/2014 \tVendor contacted\r\n21/02/2014 \tCVE obtained\r\n07/03/2014 \tPublished\r\nCopyright:\r\n\r\nCopyright \u00a9 Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.\r\nDisclaimer:\r\n\r\nThe information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user\u2019s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.\r\n", "osvdbidlist": ["104282"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:13:44", "bulletinFamily": "NVD", "description": "SQL injection vulnerability in Resources/System/Templates/Data.aspx in Procentia IntelliPen before 1.1.18.1658 allows remote authenticated users to execute arbitrary SQL commands via the value parameter.", "modified": "2018-10-09T19:43:00", "id": "CVE-2014-2043", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2043", "published": "2014-03-13T14:55:00", "title": "CVE-2014-2043", "type": "cve", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:52", "bulletinFamily": "software", "description": "\r\n\r\nVulnerability title: SQL Injection in Procentia IntelliPen\r\nCVE: CVE-2014-2043\r\nVendor: Procentia\r\nProduct: IntelliPen\r\nAffected version: 1.1.12.1520\r\nFixed version: 1.1.18.1658\r\nReported by: Jerzy Kramarz\r\n\r\nDetails:\r\n\r\nSQL injection has been found and confirmed within the software as an\r\nauthenticated user. A successful attack could allow an authenticated\r\nattacker to access information such as usernames and password hashes\r\nthat are stored in the database.\r\n \r\n\r\nFurther details at:\r\nhttps://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2043/\r\n\r\n\r\nCopyright:\r\nCopyright (c) Portcullis Computer Security Limited 2014, All rights\r\nreserved worldwide. Permission is hereby granted for the electronic\r\nredistribution of this information. It is not to be edited or altered in\r\nany way without the express written consent of Portcullis Computer\r\nSecurity Limited.\r\n\r\nDisclaimer:\r\nThe information herein contained may change without notice. Use of this\r\ninformation constitutes acceptance for use in an AS IS condition. There\r\nare NO warranties, implied or otherwise, with regard to this information\r\nor its use. Any use of this information is at the user's risk. In no\r\nevent shall the author/distributor (Portcullis Computer Security\r\nLimited) be held liable for any damages whatsoever arising out of or in\r\nconnection with the use or spread of this information.\r\n\r\n", "modified": "2014-05-05T00:00:00", "published": "2014-05-05T00:00:00", "id": "SECURITYVULNS:DOC:30644", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30644", "title": "CVE-2014-2043 - SQL Injection in Procentia IntelliPen", "type": "securityvulns", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:55", "bulletinFamily": "software", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "modified": "2014-05-05T00:00:00", "published": "2014-05-05T00:00:00", "id": "SECURITYVULNS:VULN:13733", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13733", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "zdt": [{"lastseen": "2018-04-11T11:52:40", "bulletinFamily": "exploit", "description": "Procentia IntelliPen version 1.1.12.1520 suffers from a remote SQL injection vulnerability.", "modified": "2014-03-12T00:00:00", "published": "2014-03-12T00:00:00", "id": "1337DAY-ID-22019", "href": "https://0day.today/exploit/description/22019", "type": "zdt", "title": "Procentia IntelliPen 1.1.12.1520 - Blind SQL Injection Vulnerability", "sourceData": "CVE: CVE-2014-2043\r\nVendor: Procentia\r\nProduct: IntelliPen\r\nAffected version: 1.1.12.1520\r\nFixed version: 1.1.18.1658\r\nReported by: Jerzy Kramarz\r\nDetails:\r\n \r\nSQL injection has been found and confirmed within the software as an authenticated user. A successful attack could allow an authenticated attacker to access information such as usernames and password hashes that are stored in the database.\r\n \r\nThe following URL and parameters have been confirmed to suffer from Blind SQL injection.\r\n \r\nhttp[s]://<host>/Resources/System/Templates/Data.aspx?DocID=1&field=JobID&value=1<SQL INJECTION>&JobID=1&ParentDocID=1694&InTab=1&ParentKey=JobNumber&NoStore=1&Popup=1\r\n \r\nThis vulnerability exists because \u2018value\u2019 variable is not sanitised before it is used as part of an SQL query to retrived specific job information.\r\nImpact:\r\n \r\nAn attacker would be able to exfiltrate the database, user credentials and in certain setup access the underling operating system.\r\nExploit:\r\n \r\nExploit code is not required.\r\nVendor status:\r\n07/01/2014 Advisory created\r\n16/01/2014 Vendor contacted\r\n21/02/2014 CVE obtained\r\n07/03/2014 Published\r\nCopyright:\r\n \r\nCopyright \u00a9 Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.\r\nDisclaimer:\r\n \r\nThe information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user\u2019s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.\n\n# 0day.today [2018-04-11] #", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/22019"}], "packetstorm": [{"lastseen": "2016-12-05T22:22:23", "bulletinFamily": "exploit", "description": "", "modified": "2014-03-12T00:00:00", "published": "2014-03-12T00:00:00", "href": "https://packetstormsecurity.com/files/125684/Procentia-IntelliPen-1.1.12.1520-SQL-Injection.html", "id": "PACKETSTORM:125684", "type": "packetstorm", "title": "Procentia IntelliPen 1.1.12.1520 SQL Injection", "sourceData": "`Vulnerability title: SQL Injection in Procentia IntelliPen \nCVE: CVE-2014-2043 \nVendor: Procentia \nProduct: IntelliPen \nAffected version: 1.1.12.1520 \nFixed version: 1.1.18.1658 \nReported by: Jerzy Kramarz \n \nDetails: \n \nSQL injection has been found and confirmed within the software as an authenticated user. A successful attack could allow an authenticated attacker to access information such as usernames and password hashes that are stored in the database. \n \nThe following URL and parameters have been confirmed to suffer from Blind SQL injection. \n \nhttp[s]://<host>/Resources/System/Templates/Data.aspx?DocID=1&field=JobID&value=1<SQL INJECTION>&JobID=1&ParentDocID=1694&InTab=1&ParentKey=JobNumber&NoStore=1&Popup=1 \n \nThis vulnerability exists because \u2018value\u2019 variable is not sanitised before it is used as part of an SQL query to retrived specific job information. \n \n \nFurther details at: \nhttps://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2043/ \n \n \nCopyright: \nCopyright (c) Portcullis Computer Security Limited 2014, All rights \nreserved worldwide. Permission is hereby granted for the electronic \nredistribution of this information. It is not to be edited or altered in \nany way without the express written consent of Portcullis Computer \nSecurity Limited. \n \nDisclaimer: \nThe information herein contained may change without notice. Use of this \ninformation constitutes acceptance for use in an AS IS condition. There \nare NO warranties, implied or otherwise, with regard to this information \nor its use. Any use of this information is at the user's risk. In no \nevent shall the author/distributor (Portcullis Computer Security \nLimited) be held liable for any damages whatsoever arising out of or in \nconnection with the use or spread of this information. \n`\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://packetstormsecurity.com/files/download/125684/procentiaintellipen-sql.txt"}], "seebug": [{"lastseen": "2017-11-19T13:28:20", "bulletinFamily": "exploit", "description": "CVE: \tCVE-2014-2043\r\nVendor: \tProcentia\r\nProduct: \tIntelliPen\r\nAffected version: \t1.1.12.1520\r\nFixed version: \t1.1.18.1658\r\nReported by: \tJerzy Kramarz\r\nDetails:\r\n \r\nSQL injection has been found and confirmed within the software as an authenticated user. A successful attack could allow an authenticated attacker to access information such as usernames and password hashes that are stored in the database.\r\n \r\nThe following URL and parameters have been confirmed to suffer from Blind SQL injection.\r\n \r\nhttp[s]://<host>/Resources/System/Templates/Data.aspx?DocID=1&field=JobID&value=1<SQL INJECTION>&JobID=1&ParentDocID=1694&InTab=1&ParentKey=JobNumber&NoStore=1&Popup=1\r\n \r\nThis vulnerability exists because \ufffdvalue\ufffd variable is not sanitised before it is used as part of an SQL query to retrived specific job information.\r\nImpact:\r\n \r\nAn attacker would be able to exfiltrate the database, user credentials and in certain setup access the underling operating system.\r\nExploit:\r\n```\r\nExploit code is not required.\r\nVendor status:\r\n07/01/2014 \tAdvisory created\r\n16/01/2014 \tVendor contacted\r\n21/02/2014 \tCVE obtained\r\n07/03/2014 \tPublished\r\n ```\r\nCopyright:\r\nCopyright \ufffd Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.\r\nDisclaimer:\r\n \r\nThe information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user\ufffds risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.", "modified": "2014-07-01T00:00:00", "published": "2014-07-01T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-85511", "id": "SSV:85511", "type": "seebug", "title": "Procentia IntelliPen 1.1.12.1520 (Data.aspx, value param) - Blind SQL Injection", "sourceData": "", "sourceHref": "", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}