Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Enspire eClient SQL injection allows authentication bypass
Informations
Name VU#402731 First vendor Publication 2011-10-27
Vendor VU-CERT Last vendor Modification 2011-10-27
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#402731

Enspire eClient SQL injection allows authentication bypass

Overview

Enspire eClient contains a SQL injection vulnerability that could allow an attacker to bypass authentication and access the system with administrative privileges.

I. Description

The Enspire software suite includes an eClient web front-end which is susceptible to SQL injection attacks. This can be used to perform an authentication bypass or interact with the back-end database. Depending on the configuration this can lead to the compromise of the underlying host itself. Enspire version 7.3.2.7 and eClient version 7.3.2.3 are reported to be affected. Other versions may also be affected.

II. Impact

An attacker with network access to the Enspire eClient web interface could access the system with administrative privileges and potentially compromise the underlying host.

III. Solution

We are currently unaware of an available solution to this problem.

Restrict access

Restrict access to the Enspire eClient web interface to trusted users and networks.

Vendor Information

VendorStatusDate NotifiedDate Updated
Infor Global SolutionsAffected2011-10-172011-10-24

References

http://www.dimasys.com/index.cfm?page=ENSPIRE

Credit

Thanks to Alastair Gray of Graycon Group for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

Date Public:2011-10-27
Date First Published:2011-10-27
Date Last Updated:2011-10-27
CERT Advisory: 
CVE-ID(s):CVE-2011-1915
NVD-ID(s):CVE-2011-1915
US-CERT Technical Alerts: 
Severity Metric:1.76
Document Revision:15

Original Source

Url : http://www.kb.cert.org/vuls/id/402731

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
76599 Enspire eClient Unspecified SQL Injection

Enspire eClient contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to certain unspecified input not being properly sanitized before use in SQL queries. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.