1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 |
Summary SQL Injection Vulnerability in ITSM component of Hornbill Supportworks Application CVE number: CVE-2013-2594 Impact: High Vendor homepage: http://www.hornbill.com Vendor notified: 19/11/2012 Vendor response: This issue has reportedly been fixed but the vendor refused to give version details. Credit: Joseph Sheridan of ReactionIS Affected Products Supportworks ITSM versions 1.0.0 and possibly other versions Details There is a SQL injection vulnerability in the ITSM component of the Supportworks Application. The vulnerable file is calldiary.php found in the /reports folder of the webroot. The following URL demonstrates the issue: http://vulnhost.com/reports/calldiary.php?callref=VULN This attack can be used to take full control of the host by writing a php webshell document (using mysql 'into outfile') to the webroot. Impact An attacker may be able to take full control of the Supportworks server and execute arbitrary operating-system commands. Solution Upgrade to the latest available ITSM version - contact Vendor for more details. http://www.reactionpenetrationtesting.co.uk http://www.reactionpenetrationtesting.co.uk/research.html http://www.reactionpenetrationtesting.co.uk/security-testing-services.html |