header-logo
Suggest Exploit
vendor:
Parent Connect
by:
N/A
CVSS
N/A
SQL Injection
89
CWE
Product Name: Parent Connect
Affected Version From: 2010.4.11
Affected Version To: 2010.4.11
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

SQL Injection in Specialized Data Systems Parent Connect

Specialized Data Systems Parent Connect is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Mitigation:

The vendor should sanitize user-supplied input to prevent SQL injection attacks. Additionally, prepared statements or parameterized queries should be used to mitigate this vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/40324/info

Specialized Data Systems Parent Connect is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Parent Connect 2010.4.11 is vulnerable; other versions may also be affected. 

The following example data is available:

password: ' OR '1'='1