SB2014070301 - SQL injection in Kerio Control
Published: July 3, 2014 Updated: September 29, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) SQL injection (CVE-ID: CVE-2014-3857)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the (1) x_16 or (2) x_17 parameter to print.php within the Kerio Control Statistics feature. A remote authenticated user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Example:
https://[host]:4081/print.php?x_w=overall&x_14=L1&x_15=stats&x_16=16221 AND 1=1&x_17=16221&x_18=-1&x_1b=&x_1a=&x_1l=[ VALID SESSION]&x_3k={SQL INJECTION}&x_1c=&x_1e=-270&x_1f=-1&x_3m=0&x_11=overall&x_12=individual&x_13=x_2l Remediation
Install update from vendor's website.
References
- http://fereidani.com/articles/show/76_kerio_control_8_3_1_boolean_based_blind_sql_injection
- http://osvdb.org/show/osvdb/108584
- http://packetstormsecurity.com/files/127320/Kerio-Control-8.3.1-Blind-SQL-Injection.html
- http://www.exploit-db.com/exploits/33954
- http://www.securityfocus.com/archive/1/532607/100/0/threaded