header-logo
Suggest Exploit
vendor:
TCPDB
by:
Securitylab.ir
6,4
CVSS
MEDIUM
Remote Contents Change Vulnerability
20
CWE
Product Name: TCPDB
Affected Version From: 3.8
Affected Version To: 3.8
Patch Exists: YES
Related CWE: N/A
CPE: a:tcpdb:tcpdb
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

TCPDB Remote Contents Change Vulnerability

A vulnerability exists in TCPDB 3.8 which allows remote attackers to change the contents of the application. This is due to the application not properly validating user-supplied input before using it to modify the contents of the application. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable application. This can result in the execution of arbitrary code on the vulnerable system.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of the application.
Source

Exploit-DB raw data:

########################## Securitylab.ir ########################
# Application Info:
# Name: TCPDB
# Version: 3.8
# Website: http://www.tcpdb.com/
#################################################################
# Discoverd By: Securitylab.ir
# Website: http://securitylab.ir
# Contacts: admin[at]securitylab.ir & info@securitylab[dot]ir
#################################################################
# Vulnerability Info:
# Type: Remote Contents Change Vulnerability
# Risk: Medium
#===========================================================
# http://site.com/[Path]/location
# http://site.com/[Path]/subnet
# http://site.com/[Path]/subnetmask
# http://site.com/[Path]/dhcp
# http://site.com/[Path]/machine_type
#===========================================================
#################################################################
# test:
# http://www.tcpdb.com/demo
#################################################################
# Securitylab Security Research Team
###################################################################

# milw0rm.com [2009-08-25]