Summary
This host is running SQL-Ledger and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attacker to conduct cross-site request forgery attacks and by malicious users to conduct script insertion and SQL injection attacks, or bypass certain security restrictions.
Impact Level: Application
Solution
Upgrade to SQL-Ledger version 2.8.30 or later.
For updates refer to http://www.sql-ledger.org/
Insight
- The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can be exploited to perform actions with the privileges of a target user, who is tricked into visiting a malicious website.
- Input passed via customer names, vendor names, the DCN description field in 'Accounts Receivables', and the description field in 'Accounts Payable', is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when the malicious data is viewed.
- Input passed via the 'id' parameter when searching for vendors is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
- Input passed via the 'countrycode' field in 'Preferences' is not properly sanitised before used to include files. This can be exploited to include arbitrary '.pl' files from the local system via directory traversal attacks.
Affected
SQL-Ledger version 2.8.24 and prior
References
Severity
Classification
-
CVE CVE-2009-3580, CVE-2009-3581, CVE-2009-3582, CVE-2009-3583, CVE-2009-3584, CVE-2009-4402 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities