exploit-db-mirror/exploits/php/webapps/25002.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

78 lines
No EOL
1.3 KiB
Text

Summary
SQL Injection Vulnerability in ITSM component of Hornbill Supportworks
Application
CVE number: CVE-2013-2594
Impact: High
Vendor homepage: http://www.hornbill.com
Vendor notified: 19/11/2012
Vendor response: This issue has reportedly been fixed but the vendor
refused to give version details.
Credit: Joseph Sheridan of ReactionIS
Affected Products
Supportworks ITSM versions 1.0.0 and possibly other versions
Details
There is a SQL injection vulnerability in the ITSM component of the
Supportworks Application. The vulnerable file is calldiary.php found in the
/reports folder of the webroot. The following URL demonstrates the issue:
http://vulnhost.com/reports/calldiary.php?callref=VULN
This attack can be used to take full control of the host by writing a php
webshell document (using mysql 'into outfile') to the webroot.
Impact
An attacker may be able to take full control of the Supportworks server and
execute arbitrary operating-system commands.
Solution
Upgrade to the latest available ITSM version - contact Vendor for more
details.
http://www.reactionpenetrationtesting.co.uk
http://www.reactionpenetrationtesting.co.uk/research.html
http://www.reactionpenetrationtesting.co.uk/security-testing-services.html