Overview
BigAnt IM Message server and components contain multiple vulnerabilities which could allow an attacker to perform administrative functions on the the system
Description
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - CVE-2012-6273 During the SHU request (search user) from the bigant messaging client, a sql query is built from a template and sent via a http like header. Proper sanitization is not performed. It has been reported this can be demonstrated by opening up the BigAnt Messenger Client, logging into a server, and searching for an 'Account/Full Name' of blah' OR hs_User.Col_Pword LIKE '[a-z] |
Impact
A remote unauthenticated attacker may obtain sensitive information, cause a denial of service condition or execute arbitrary code with the privileges of the application. |
Solution
We are currently unaware of a practical solution to this problem. |
Restrict access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 9.7 | AV:N/AC:L/Au:N/C:P/I:C/A:C |
Temporal | 7.5 | E:POC/RL:W/RC:UC |
Environmental | 1.9 | CDP:L/TD:L/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to hamburgers maccoy for reporting this vulnerability.
This document was written by Michael Orlando.
Other Information
CVE IDs: | CVE-2012-6273, CVE-2012-6274, CVE-2012-6275 |
Date Public: | 2013-01-09 |
Date First Published: | 2013-01-09 |
Date Last Updated: | 2013-01-09 12:26 UTC |
Document Revision: | 9 |