#VU9395 SQL injection in SecurityCenter


Published: 2017-11-15 | Updated: 2017-11-22

Vulnerability identifier: #VU9395

Vulnerability risk: Low

CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-11508

CWE-ID: CWE-89

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SecurityCenter
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor: Tenable Network Security

Description

The vulnerability allows a remote authenticated attacker to execute arbitrary SQL commands in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in web application database.

Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.

Mitigation
Update to version 5.6.0.

Vulnerable software versions

SecurityCenter: 5.5.0 - 5.5.2


External links
http://www.tenable.com/security/tns-2017-13


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability