Home / os / wins2003

RXTEC RXAdmin SQL Injection

Posted on 25 November 2015

### RXTEC_20150513 #### Title: SQL injection vulnerability in the RXTEC RXAdmin Login Page allows remote attackers to execute arbitrary SQL commands via several HTTP parameter. #### Type of vulnerability: SQL injection ##### Attack outcome: It is possible to extract all information from the database in use by the application. Depending on the configuration of the SQL server arbitrary code execution might be possible. #### Impact: Critical #### Software/Product name: RXTEC RXAdmin Login #### Affected versions: UPDATE : 06 / 2012 #### Fixed in version: *unknown* #### Vendor: RXTEC (www.rxtec.net) #### CVE number: CVE-2015-8298 #### Timeline * `2015-04-30` identification of vulnerability * `2015-05-11` vendor contact (won't fix because of outdated version) * `2015-07-14` contact cve-request@mitre. #### Credits: Thomas Konrad `tkonrad@sba-research.org` (SBA Research) #### Description: The following parameters are affectey by the vulnerability: * /index.htm (loginpassword parameter) * /index.htm (loginusername parameter) * /index.htm (zusätzlicher parameter) * /index.htm (zusätzlicher parameter) * /index.htm (rxtec cookie) * /index.htm (groupid parameter) #### Proof-of-concept: *none*

 

TOP