Samsung Data Management Server < 1.4.3 verifyUser Method SQL Injection

High Nessus Plugin ID 53877


The remote web server is prone to a SQL injection attack.


The remote web server is an embedded web server in a Samsung Integrated Management System DMS (Data Management Server), an embedded hardware device used to manange a large number of air conditioning units.

According to its self-reported version, the version of this web server is earlier than 1.4.3. Such versions are reportedly affected by a SQL injection vulnerability due to a failure of the software to sanitize input to the username and password fields of the login page before using it in a database query in the 'verifyUser()' method in the LoginManager class.

An unauthenticated remote attacker can leverage this issue to manipulate database queries and, for example, bypass authentication and gain administrative access to the device.


Upgrade DMS to 1.4.3 or later.

See Also

Plugin Details

Severity: High

ID: 53877

File Name: scada_samsung_dms_1_4_3.nbin

Version: $Revision: 1.24 $

Type: remote

Family: SCADA

Published: 2011/05/11

Modified: 2018/01/29

Dependencies: 10107

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/05/09

Vulnerability Publication Date: 2011/05/09

Reference Information

CVE: CVE-2010-4284

BID: 47726

OSVDB: 72227

CERT: 236668

ICS-ALERT: 11-069-01