Overview
WebEOC contains multiple SQL injection vulnerabilities that may allow attackers to execute sql queries, potentially viewing or modifying data, or executing database commands.
Description
WebEOC is a web-based crisis information management application that provides functions to gather, coordinate, and disseminate information between emergency personnel and Emergency Operations Centers (EOC). WebEOC does not properly filter user input, allowing a remote attacker to supply SQL commands that may be executed by the underlying database. |
Impact
A remote attacker may be able to execute SQL queries on a server, possibly with elevated privileges. As a result, attackers may be able to view or modify the contents of a WebEOC database, including authentication and sensitive medical information. |
Solution
Upgrade Version 6.0.2 corrects this vulnerability. According to ESi: |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This document is based on technical analysis by IOActive and additional information from ESi. Thanks also to the City of Seattle for bringing this to our attention.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | CVE-2005-2284 |
Severity Metric: | 5.27 |
Date Public: | 2005-07-13 |
Date First Published: | 2005-07-13 |
Date Last Updated: | 2005-07-20 02:40 UTC |
Document Revision: | 34 |