|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Cyberstrong eShop SQL Injection Vulnerabilities Vulnerability Assessment Details
|
Cyberstrong eShop SQL Injection Vulnerabilities |
||
Checks for an SQL injection in Cyberstrong eShop v4.2 Detailed Explanation for this Vulnerability Assessment The remote host is running Cyberstrong eShop, a shopping cart written in ASP. The remote version of this software contains several input validation flaws leading to SQL injection vulnerabilities. A possible hacker may exploit these flaws to affect database queries, possibly resulting in disclosure of sensitive information (for example, the admin's user and password) and attacks against the underlying database. See also : http://archives.neohapsis.com/archives/bugtraq/2003-07/0006.html Solution : None at this time Network Security Threat Level: High Networks Security ID: 14101, 14103, 14112 Vulnerability Assessment Copyright: Copyright (C) 2005 Josh Zlatin-Amishav |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |