[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] : CVE-2015-8298 SQL Injection Vulnerability in RXTEC RXAdmin
From:       SBA Research Advisory <advisory () sba-research ! org>
Date:       2015-11-23 12:21:40
Message-ID: 565304D4.5080101 () sba-research ! org
[Download RAW message or body]

[Attachment #2 (multipart/signed)]

[Attachment #4 (multipart/mixed)]


### RXTEC_20150513 #### Title: SQL injection vulnerability in the RXTEC RXAdmin Login Page  \
allows remote attackers to execute arbitrary SQL commands via several HTTP parameter. #### Type \
of vulnerability: SQL injection ##### Attack outcome: It is possible to extract all information \
from the database in use by the application. Depending on the configuration of the SQL server \
arbitrary code execution might be possible. #### Impact: Critical
#### Software/Product name: RXTEC RXAdmin Login 
#### Affected versions: UPDATE : 06 / 2012
#### Fixed in version: *unknown* #### Vendor: RXTEC (www.rxtec.net)
#### CVE number: CVE-2015-8298
#### Timeline * `2015-04-30` identification of vulnerability 
* `2015-05-11` vendor contact (won't fix because of outdated version)
* `2015-07-14` contact cve-request@mitre.

#### Credits: Thomas Konrad `tkonrad@sba-research.org` (SBA Research)  
 
#### Description: The following parameters are affectey by the vulnerability:

* /index.htm (loginpassword parameter)
* /index.htm (loginusername parameter)
* /index.htm (zusätzlicher parameter)
* /index.htm (zusätzlicher parameter)
* /index.htm (rxtec cookie)
* /index.htm (groupid parameter)

#### Proof-of-concept: *none*


["0x58F775B2.asc" (application/pgp-keys)]
["signature.asc" (application/pgp-signature)]

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic