ITSM Hornbill Supportworks SQL Injection

2013.04.24
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

SQL Injection Vulnerability in ITSM component of Hornbill Supportworks Application CVE number: CVE-2013-2594 Impact: High Vendor homepage: http://www.hornbill.com Vendor notified: 19/11/2012 Vendor response: This issue has reportedly been fixed but the vendor refused to give version details. Credit: Joseph Sheridan of ReactionIS Affected Products Supportworks ITSM versions 1.0.0 and possibly other versions Details There is a SQL injection vulnerability in the ITSM component of the Supportworks Application. The vulnerable file is calldiary.php found in the /reports folder of the webroot. The following URL demonstrates the issue: http://vulnhost.com/reports/calldiary.php?callref=VULN This attack can be used to take full control of the host by writing a php webshell document (using mysql ‘into outfile’) to the webroot. Impact An attacker may be able to take full control of the Supportworks server and execute arbitrary operating-system commands. Solution Upgrade to the latest available ITSM version - contact Vendor for more details. http://www.reactionpenetrationtesting.co.uk http://www.reactionpenetrationtesting.co.uk/research.html http://www.reactionpenetrationtesting.co.uk/security-testing-services.html

References:

http://www.reactionpenetrationtesting.co.uk/hornbill-supportworks-sql-injection.html
ttp://www.reactionpenetrationtesting.co.uk/security-testing-services.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top