header-logo
Suggest Exploit
vendor:
ZENworks Patch Management
by:
Unknown
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: ZENworks Patch Management
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

ZENworks Patch Management SQL Injection Vulnerabilities

ZENworks Patch Management is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. It should be noted these vulnerabilities can only be exploited if a non-privileged account has been created. Only an administrator can create such an account.

Mitigation:

It is recommended to apply the latest patches or updates provided by the vendor to fix these vulnerabilities. Additionally, ensure that user-supplied input is properly sanitized before using it in SQL queries.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15220/info
 
ZENworks Patch Management is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.
 
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
 
It should be noted these vulnerabilities can only be exploited if a non-privileged account has been created. Only an administrator can create such an account.

http://www.example.com/reports/default.asp?sort=[ReportImpact_Name]&Dir=asc&SearchText=';StatusFilter=ERRR&computerFilter=187&impactFilter=29&saveFilter=save&Page=rep
http://www.example.com/reports/default.asp?sort=[ReportImpact_Name]&Dir=asc&SearchText=CIRT.DK&StatusFilter=';&computerFilter=187&impactFilter=29&saveFilter=save&Page=rep
http://www.example.com/reports/default.asp?sort=[ReportImpact_Name]&Dir=asc&SearchText=CIRT.DK&StatusFilter=ERRR&computerFilter=';&impactFilter=29&saveFilter=save&Page=rep