Summary
The host is running ASP-Dev XM Events Diary and prone to multiple vulnerabilities.
Vulnerabilities Insight:
- Input passed to the 'cat' parameter in 'default.asp' and 'diary_viewC.asp' are not properly sanitised before being used in SQL queries.
- Insufficient access control to the database file 'diary.mdb' which is being used for Events Diary web application.
Impact
Successful exploitation will let the attacker execute arbitrary codes in the in the context of the web application or can execute sql injection attack to gain sensitive information about the database engine and table structures.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Affected
ASP-Dev XM Event Diary Multiple Vulnerabilities
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-5923, CVE-2008-5924, CVE-2008-5925 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- ActualAnalyzer Lite 'ant' Cookie Parameter Remote Command Execution Vulnerability
- AVTECH DVR Multiple Vulnerabilities
- AlstraSoft AskMe Pro 'forum_answer.php' and 'profile.php' Multiple SQL Injection Vulnerabilities
- Arkeia Appliance Multiple Vulnerabilities
- ArticleFR CMS 'id' Parameter SQL Injection Vulnerability