Symantec IM Manager whereClause Parameter SQL Injection (SYM10-010)

Critical Nessus Plugin ID 50433


A web application on the remote Windows host is prone to a SQL injection attack.


The version of Symantec IM Manager installed on the remote Windows host fails to sanitize input to the 'whereClause' parameter of the 'rdpageimlogic.aspx' script before using it in the 'LoggedInUsers.lgx' definition file to construct database queries.

An unauthenticated attacker may be able to exploit this issue to manipulate database queries, leading to disclosure of sensitive information or attacks against the underlying database.

Note that the application is also likely to be affected by several other related SQL injection vulnerabilities, although Nessus has not checked them.


Upgrade to Symantec IM Manager 8.4.16 or later.

See Also

Plugin Details

Severity: Critical

ID: 50433

File Name: symantec_im_mgr_whereclause_sqli.nasl

Version: $Revision: 1.9 $

Type: remote

Agent: windows

Family: Windows

Published: 2010/11/01

Modified: 2016/11/17

Dependencies: 10107

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:symantec:im_manager

Required KB Items: www/ASP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2010/10/27

Vulnerability Publication Date: 2010/10/27

Reference Information

CVE: CVE-2010-0112

BID: 44299

OSVDB: 68902