VID |
21803 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Web server has a CGI file vulnerable to an SQL injection vulnerability in the 'Referer' HTTP header. The relevant CGI file could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of input passed to the 'Referer' field of the HTTP request. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://www.unixwiz.net/techtips/sql-injection.html http://www.tech-faq.com/sql-injection-attack.shtml http://www.cgisecurity.com/development/sql.shtml http://www.securitydocs.com/library/2656 http://www.securitydocs.com/library/3348 http://www.securitydocs.com/library/3587 http://www.securiteam.com/securityreviews/5DP0N1P76E.html http://www.iss.net/security_center/static/8783.php http://www.spidynamics.com/papers/SQLInjectionWhitePaper.pdf
* Platforms Affected: Any HTTP server Any version Any operating system Any version |
Recommendation |
Modify the affected CGI script to perform proper validation of user-supplied input passed to the 'Referer' HTTP Header. For details, please see the Web site at http://stuff.mit.edu/afs/athena/astaff/reference/cert/Tips/cgi_metacharacters |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|