Vulnerability CVE-2006-0897


Published: 2006-02-25   Modified: 2012-02-12

Description:
** DISPUTED ** SQL injection vulnerability in VCS Virtual Program Management Intranet (VPMi) Enterprise 3.3 allows remote attackers to execute arbitrary SQL commands via the UpdateID0 parameter to Service_Requests.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: the vendor has disputed this issue, saying that "[we] have a behind the scenes complex state management system that uses a combination of keys placed in JavaScript and Session State (server side) that protects against the type of SQL injection you describe. We have tested for many of the cases and have not found it to be an issue." Further investigation suggests that the original researcher might have triggered errors using invalid field values, which is not proof of SQL injection; however, the vendor did not receive a response from the original researcher.

Type:

CWE-89

(Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Virtual communication services -> Vpmi enterprise 

 References:
http://xforce.iss.net/xforce/xfdb/24885
http://www.vupen.com/english/advisories/2006/0725
http://www.securityfocus.com/bid/16798
http://www.osvdb.org/23479
http://www.attrition.org/pipermail/vim/2006-March/000599.html
http://www.attrition.org/pipermail/vim/2006-March/000598.html
http://secunia.com/advisories/18842

Copyright 2024, cxsecurity.com

 

Back to Top