Ipswitch WhatsUp Professional Login.asp Multiple Field SQL Injection

medium Nessus Plugin ID 18552

Synopsis

The remote web server contains an ASP script that is vulnerable to a SQL injection attack.

Description

The remote host is running Ipswitch WhatsUp Professional, a network management and monitoring package.

The web front-end for WhatsUp Professional on the remote host is prone to a SQL injection attack because it fails to sanitize the 'sUserName' and 'sPassword' parameters in the 'Login.asp' script. An attacker may be able to exploit this flaw to gain unauthenticated administrative access to the affected application.

Note that the web front-end is not installed as part of a default configuration.

Solution

Upgrade to Ipswitch WhatsUp Pro 2005 SP1a or disable its web front-end.

See Also

http://www.nessus.org/u?775cfb0d

Plugin Details

Severity: Medium

ID: 18552

File Name: ipswitch_whatsup_login_sql_injection.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 6/23/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:ipswitch:whatsup

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 6/22/2005

Reference Information

CVE: CVE-2005-1250

BID: 14039