vendor:
Virtua InfoStation.cgi
by:
José Tozo
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Virtua InfoStation.cgi
Affected Version From: All Versions under 2014.X
Affected Version To: 2013.2.X
Patch Exists: YES
Related CWE: CVE-2014-2081
CPE: VTLS Virtua InfoStation.cgi
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2014
VTLS Virtua InfoStation.cgi SQLi
Due to improper sanitization, InfoStation.cgi is prone to a SQL Injection vulnerability in its "username" and "password" fields, which could lead an attacker to take over the server database. The vulnerability can be exploited by manipulating the aforementioned parameters as decribed in the following example: http://www.example.com/web_reports/cgi-bin/InfoStation.cgi?mod=login&func=process&database=1&lang_code=en&report_group=Adm&filter=aaa&username=[SQLI]&password=[SQLI] Currently, the username/password fields on the Infostation login page are vulnerable to attack through modification of the URL via sql injection.
Mitigation:
The vulnerability can be mitigated by properly sanitizing the username and password fields.