Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:SQL:INJ:SCOZNET-ADMINNAME

Severity

Medium

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

ScozNet ScozBook AdminName Variable SQL Injection

Release Date

2013/05/02

Update Number

2260

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: ScozNet ScozBook AdminName Variable SQL Injection


This signature detects attempts to exploit a known SQL injection vulnerability in the ScozNet ScozBook AdminName Variable. It is due to insufficient validation of a parameter sent to the auth.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Extended Description

ScozNet ScozBook is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Affected Products

  • ScozNet ScozBook 1.1.0 Beta

References

  • BugTraq: 16115
  • CVE: CVE-2006-0079

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out