Korean
<< Back
VID 21650
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The web front-end for WhatsUp Professional is vulnerable to an SQL injection vulnerability in the "Login.asp" script. Ipswitch WhatsUp Professional 2005 (SP1) is a network management and monitoring package for Microsoft Windows operating systems. Ipswitch WhatsUp Professional 2005 (SP1) could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the 'sUserName' and 'sPassword' parameters in the logon screen of the web front end (NmConsole/Login.asp). This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://www.idefense.com/application/poi/display?id=268&type=vulnerabilities

* Platforms Affected:
Ipswitch, Inc., WhatsUp Professional 2005 SP1
Microsoft Windows Any version
Recommendation Upgrade to the latest version of Ipswitch WhatsUp Professional 2005 (SP1a or later), available from the Ipswitch Inc. Web site at http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html
Related URL CVE-2005-1250 (CVE)
Related URL 14039 (SecurityFocus)
Related URL 21111 (ISS)