| VID |
21650 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The web front-end for WhatsUp Professional is vulnerable to an SQL injection vulnerability in the "Login.asp" script. Ipswitch WhatsUp Professional 2005 (SP1) is a network management and monitoring package for Microsoft Windows operating systems. Ipswitch WhatsUp Professional 2005 (SP1) could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the 'sUserName' and 'sPassword' parameters in the logon screen of the web front end (NmConsole/Login.asp). This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://www.idefense.com/application/poi/display?id=268&type=vulnerabilities
* Platforms Affected: Ipswitch, Inc., WhatsUp Professional 2005 SP1 Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of Ipswitch WhatsUp Professional 2005 (SP1a or later), available from the Ipswitch Inc. Web site at http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html |
| Related URL |
CVE-2005-1250 (CVE) |
| Related URL |
14039 (SecurityFocus) |
| Related URL |
21111 (ISS) |
|