Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:WHATSUP:WEB-SQL-INJECT

Severity

Medium

Recommended

No

Category

HTTP

Keywords

WhatsUp Web Interface SQL Injection

Release Date

2005/06/24

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: WhatsUp Web Interface SQL Injection


This signature detects SQL injection attempts against Ipswitch WhatsUp Professional. WhatsUp does not sufficiently validate user-supplied data submitted through the WhatsUP Web interface. Attackers can input malformed data to execute arbitrary SQL statements in the WhatsUp database.

Extended Description

WhatsUp Professional is prone to an SQL injection vulnerability affecting its Web-based front end. This issue is due to a failure in the application to properly sanitize user-supplied input to the 'login.asp' script before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. It should be noted that by supplying a 'or' value through the 'password' parameter, an attacker can gain unauthorized access to an affected site.

Affected Products

  • Ipswitch WhatsUp Professional 2005 SP1

References

  • BugTraq: 14039
  • CVE: CVE-2005-1250
  • URL: http://www.idefense.com/application/poi/display?id=268

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out