Dell KACE K1000 < 5.5 Multiple SQL Injection Vulnerabilities

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The web interface for a system management appliance is affected by
multiple SQL injection vulnerabilities.

Description :

The web interface for the version of the Dell KACE K1000 appliance on
the remote host is affected by multiple SQL injection vulnerabilities.
The following parameters and scripts are affected :

- The 'TYPE_ID' parameter of 'adminui/history_log.php'.

- The 'ID' parameter of 'adminui/service.php',
'adminui/software.php',
'adminui/settings_network_scan.php', 'adminui/asset.php',
'adminui/asset_type.php', 'adminui/metering.php',
'adminui/mi.php', 'adminui/replshare.php',
'adminui/kbot.php', '/userui/advisory_detail.php',
and '/userui/ticket.php'.

- The 'macAddress' and 'getKBot' parameters of
'/service/kbot_service.php'.

- The 'ORDER[]' parameter of '/userui/ticket_list.php'.

Note that Nessus has not tested for these issues, but instead has relied
only on the application's self-reported version number.

See also :

http://www.vulnerability-lab.com/get_content.php?id=832
http://www.nessus.org/u?e29997ea
http://www.kace.com/support/resources/kb/solutiondetail?sol=SOL119257

Solution :

Upgrade KACE to version 5.5 or later

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 7.1
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 72392 ()

Bugtraq ID: 61382
65029

CVE ID: CVE-2014-1671