#VU41732 SQL injection in DocuShare - CVE-2014-3138
Published: May 2, 2014 / Updated: August 11, 2020
DocuShare
Xerox
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the PATH_INFO to /docushare/dsweb/ResultBackgroundJobMultiple/. NOTE: some of these details are obtained from third party information. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://packetstormsecurity.com/files/126171/Xerox-DocuShare-SQL-Injection.html
- http://seclists.org/fulldisclosure/2014/Apr/205
- http://secunia.com/advisories/57996
- http://www.exploit-db.com/exploits/32886
- http://www.osvdb.org/105972
- http://www.securityfocus.com/bid/66922
- http://www.xerox.com/download/security/security-bulletin/a72cd-4f7a54ce14460/cert_XRX14-003_V1.0.pdf
- https://exchange.xforce.ibmcloud.com/vulnerabilities/92548