#VU21403 SQL injection in Kerio Control - CVE-2014-3857
Published: September 29, 2019
Kerio Control
GFI Software
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the (1) x_16 or (2) x_17 parameter to print.php within the Kerio Control Statistics feature. A remote authenticated user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Example:
https://[host]:4081/print.php?x_w=overall&x_14=L1&x_15=stats&x_16=16221 AND 1=1&x_17=16221&x_18=-1&x_1b=&x_1a=&x_1l=[ VALID SESSION]&x_3k={SQL INJECTION}&x_1c=&x_1e=-270&x_1f=-1&x_3m=0&x_11=overall&x_12=individual&x_13=x_2l Remediation
External links
- http://fereidani.com/articles/show/76_kerio_control_8_3_1_boolean_based_blind_sql_injection
- http://osvdb.org/show/osvdb/108584
- http://packetstormsecurity.com/files/127320/Kerio-Control-8.3.1-Blind-SQL-Injection.html
- http://www.exploit-db.com/exploits/33954
- http://www.securityfocus.com/archive/1/532607/100/0/threaded