Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Hosting Controller < 6.1 Hotfix 2.2 Multiple Vulnerabilities


Vulnerability Assessment Details

Hosting Controller < 6.1 Hotfix 2.2 Multiple Vulnerabilities

Vulnerability Assessment Summary
Checks for multiple vulnerabilities in Hosting Controller < 6.1 hotfix 2.2

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains an ASP application with multiple flaws.

Description :

According to its version number, the version of Hosting Controller on
the remote host is subject to multiple flaws :

- Denial of Service Vulnerabilities
By accessing the 'editplanopt3.asp', 'planmanager.asp',
and 'plansettings.asp' scripts directly or with specific
parameters, a possible hacker can cause the 'inetinfo.exe'
process to consume a large amount of CPU resources.

- Multiple SQL Injection Vulnerabilities
An authenticated attacker can affect SQL queries by
manipulating input to the 'searchtext' parameter of the
'IISManagerDB.asp' and 'AccountManager.asp' scripts and
the 'ListReason' parameter of the 'listreason.asp'
script.

- Access Rights Vulnerabilities
Several scripts fail to restrict access to privileged
users, which permits non-privileged users to add accounts
with elevated rights and make changes to various
plan settings. Another failure permits users to gain
elevated rights by first accessing the
'dsp_newreseller.asp' script before returning to the
application's homepage.

See also :

http://hostingcontroller.com/english/logs/hotfixlogv61_2_2.html

Solution :

Upgrade to version 6.1 if necessary and apply Hotfix 2.2.

Network Security Threat Level:

Low / CVSS Base Score : 3
(AV:R/AC:L/Au:R/C:P/A:N/I:P/B:N)

Networks Security ID: 14258, 14283

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

New AMD CPU AD9500AHABBOX Bristol Ridge AM4 A6 9500E APU 35 Watts Retail
$85.61
New AMD CPU AD9500AHABBOX Bristol Ridge AM4 A6 9500E APU 35 Watts Retail pictureNew AMD CPU AD9600AGABBOX Bristol Ridge AM4 A8 9600 APU 65 Watts Retail
$100.56
New AMD CPU AD9600AGABBOX Bristol Ridge AM4 A8 9600 APU 65 Watts Retail pictureNew AMD CPU AD9700AHABBOX Bristol Ridge AM4 A10 9700E APU 35 Watts Retail
$123.11
New AMD CPU AD9700AHABBOX  Bristol Ridge AM4 A10 9700E APU 35 Watts Retail pictureNew Intel CPU BX80684I78700K Core i7-8700K Boxed 12M Cache 3.70GHz Socket 1151 6
$507.62
New Intel CPU BX80684I78700K Core i7-8700K Boxed 12M Cache 3.70GHz Socket 1151 6 picture


Discussions


Warning: mysql_query(): MySQL server has gone away in /home/vscan/public_html/comments.php on line 15

Warning: mysql_query(): Error reading result set's header in /home/vscan/public_html/comments.php on line 15

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/comments.php on line 16

No Discussions have been posted on this vulnerability.