vendor:
MapEdit
by:
Paul Baade (TÜV Rheinland i-sec GmbH) and Sven Krewitt (TÜV Rheinland i-sec GmbH)
9
CVSS
CRITICAL
Authentication via GET Parameter and Execution of arbitrary SQL commands on contained SQLite DBs
tbd
CWE
Product Name: MapEdit
Affected Version From: 3.2.6.0
Affected Version To: 6.2.74
Patch Exists: YES
Related CWE: tbd
CPE: Mensch und Maschine Software SE / Mensch und Maschine acadGraph GmbH:MapEdit
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
tbd
Multiple Vulnerabilities – MuM Map Edit
MuM MapEdit provides geodata to the internet and intranets and is deployed on several communal and regional governmental infrastructures to provide geodata to the population. It consists of a silverlight client and a C#.NET backend. The communication between them is HTTP/S based and involves the NBFS (.NET Binary Format SOAP). The application requires users to provide their credentials via GET Parameters. They can therefore possibly be found in server logs or proxy logs. An authenticated user may send POST requests to the URL /Mum.Geo.Services/DataAccessService.svc. This service is used to execute SQL queries on the databases.
Mitigation:
According to MuM all described vulnerabilities are fixed in version 6.2.74, some of them are reportedly already fixed in version 5.1.