Summary
This host is running WebTester and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to manipulate SQL queries by injecting arbitrary SQL code, Upload arbitrary file, and disclose sensitive information.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Multiple flaws are due to,
- Input passed via 'TestID' parameter to 'startTest.php' script is not properly sanitized before being used in the code.
- The application is not verifying permissions when accessing certain files like phpinfo.php and '/tiny_mce/plugins/filemanager/InsertFile/insert_file.php' - Application is not removing installed files after installation.
Affected
WebTester version 5.x, Other versions may also be affected.
Detection
Send a HTTP GET request and check whether it is able to read sensitive information or not.
References
Updated on 2017-03-28
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Ad Manager Pro Multiple SQL Injection And XSS Vulnerabilities
- 3Com OfficeConnect VPN Firewall Default Password Security Bypass Vulnerability
- ArticleFR CMS 'id' Parameter SQL Injection Vulnerability
- AlienVault Open Source SIEM (OSSIM) 'timestamp' Parameter Directory Traversal Vulnerability
- A-Blog 'sources/search.php' SQL Injection Vulnerability