Korean
<< Back
VID 21803
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Web server has a CGI file vulnerable to an SQL injection vulnerability in the 'Referer' HTTP header. The relevant CGI file could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of input passed to the 'Referer' field of the HTTP request. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://www.unixwiz.net/techtips/sql-injection.html
http://www.tech-faq.com/sql-injection-attack.shtml
http://www.cgisecurity.com/development/sql.shtml
http://www.securitydocs.com/library/2656
http://www.securitydocs.com/library/3348
http://www.securitydocs.com/library/3587
http://www.securiteam.com/securityreviews/5DP0N1P76E.html
http://www.iss.net/security_center/static/8783.php
http://www.spidynamics.com/papers/SQLInjectionWhitePaper.pdf

* Platforms Affected:
Any HTTP server Any version
Any operating system Any version
Recommendation Modify the affected CGI script to perform proper validation of user-supplied input passed to the 'Referer' HTTP Header. For details, please see the Web site at http://stuff.mit.edu/afs/athena/astaff/reference/cert/Tips/cgi_metacharacters
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)