header-logo
Suggest Exploit
vendor:
Support Center
by:
Unknown
9
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Support Center
Affected Version From: 2.2
Affected Version To: 2.2
Patch Exists: NO
Related CWE:
CPE: a:support_center:support_center:2.2
Metasploit:
Other Scripts:
Platforms Tested:
2006

Multiple SQL Injection Vulnerabilities in Support Center

Support Center is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Mitigation:

To mitigate these vulnerabilities, it is recommended to sanitize and validate user-supplied input before using it in SQL queries. Additionally, keeping the application up-to-date with the latest security patches and conducting regular security audits can help prevent such vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15570/info

Support Center is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

These issues are reported to affect Support Center version 2.2; earlier versions may also be vulnerable. 

http://www.example.com/search.php?field=Subject&searchvalue=&Category=any&Status=any&Priority=any&lorder=[SQL]
http://www.example.com/search.php?field=Subject&searchvalue=&Category=any&Status=any&Priority=[SQL]
http://www.example.com/search.php?field=Subject&searchvalue=&Category=any&Status=[SQL]
http://www.example.com/search.php?field=Subject&searchvalue=&Category=[SQL]
http://www.example.com/search.php?field=Subject&searchvalue=[SQL]
http://www.example.com/search.php?field=[SQL]