Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:PKG:SALESLOGIC-UNAUTH-ADMN

Severity

Medium

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

SalesLogics Unauthenticated slxweb.dll Admin Access

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: SalesLogics Unauthenticated slxweb.dll Admin Access


This signature detects attempts to exploit a known vulnerability against the SalesLogix Eviewer Web Application. Attackers can remotely send maliciously formatted URL requests to execute administrative commands without authentication.

Extended Description

SalesLogix eViewer is a web application integrated with the SalesLogix 2000 package. eViewer will not perform authorization on administrative commands if they are requested directly in the URL. Therefore, the URL: http: //target/scripts/slxweb.dll/admin?command=shutdown will cause the slxweb.dll process to shutdown. Possibly other commands aside from 'shutdown' could be performed by a remote user as well. Although the slxweb.dll process will restart once a new query or session is issued, continually requesting the URL above will cause a denial of service. Additional notes: The program which issues administrative commands (slxweb.dll) is installed by default in the /scripts directory and cannot be relocated. In addition to this security concern, the package requires a user to change the default anonymous username (IUSR_{systemname}) in Microsoft IIS to 'slxwebuser' and grant it administrative privileges.

Affected Products

  • SalesLogix Corporation eViewer 1.0.0

References

  • BugTraq: 1089
  • CVE: CVE-2000-0278

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out