activeWeb contentserver admin/picture/picture_real_edit.asp id Variable SQL Injection

2007-07-13T00:00:00
ID OSVDB:36511
Type osvdb
Reporter RedTeam Pentesting()
Modified 2007-07-13T00:00:00

Description

Vulnerability Description

contentserver contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the admin/picture/picture_real_edit.asp script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Upgrade to version 5.6.2964 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

contentserver contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the admin/picture/picture_real_edit.asp script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

https://[target]/admin/picture/picture_real_edit.asp?id='%20union%20select%20@@version%20,@@microsoftversion,@@version--

References:

Secunia Advisory ID:26063 Other Advisory URL: http://www.redteam-pentesting.de/advisories/rt-sa-2007-004.php Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-07/0132.html ISS X-Force ID: 35390 CVE-2007-3013 Bugtraq ID: 24894