Summary
This host is running BrowserCRM and is prone to multiple sql injection and cross site scripting vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary web script or HTML in a user's browser session in the context of an affected site and manipulate SQL queries by injecting arbitrary SQL code.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Multiple flaws are due to inputs passed via
- The 'PATH_INFO' to index.php, modules/admin/admin_module_index.php, or modules/calendar/customise_calendar_times.php, 'login[]' parameter to index.php or pub/clients.php and 'framed' parameter to licence/index.php or licence/view.php is not properly verified before it is returned to the user.
- The 'login[username]' parameter to index.php, 'parent_id' parameter to modules/Documents/version_list.php or 'contact_id' parameter to modules/Documents/index.php is not properly sanitized before being used in a SQL query.
Affected
BrowserCRM version 5.100.1 and prior
References
Severity
Classification
-
CVE CVE-2011-5213, CVE-2011-5214 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Allegro RomPager `Misfortune Cookie` Vulnerability
- AlienVault Open Source SIEM (OSSIM) 'timestamp' Parameter Directory Traversal Vulnerability
- A-Blog 'sources/search.php' SQL Injection Vulnerability
- Assesi 'bg' Parameter SQL Injection vulnerability
- AjaXplorer zoho plugin Directory Traversal Vulnerability