Vulnerability CVE-2005-4195


Published: 2005-12-13   Modified: 2012-02-12

Description:
Multiple SQL injection vulnerabilities in Scout Portal Toolkit (SPT) 1.3.1 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the ParentId parameter in SPT--BrowseResources.php, (2) ResourceId parameter in SPT--FullRecord.php, (3) ResourceOffset parameter in SPT--Home.php, and (4) F_UserName and (5) F_Password in SPT--UserLogin.php. NOTE: it was later reported that vector 1 is also present in 1.4.0.

Type:

CWE-89

(Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Internet scout project -> Scout portal toolkit 
Internet scout -> Scout portal toolkit 

 References:
http://www.securityfocus.com/archive/1/491611/100/0/threaded
http://www.securityfocus.com/bid/15818
http://www.securityfocus.com/bid/29034
http://www.vupen.com/english/advisories/2005/2844
http://www.x-illusion.com/rs/Scout%20Portal%20Toolkit.txt
https://exchange.xforce.ibmcloud.com/vulnerabilities/23547
https://exchange.xforce.ibmcloud.com/vulnerabilities/42169
https://www.exploit-db.com/exploits/5540

Copyright 2024, cxsecurity.com

 

Back to Top