Multiple SQL injection vulnerabilities in Plixer International Scrutinizer NetFlow & sFlow Analyzer 8.6.2.16204, and possibly other versions before 9.0.1.19899, allow remote attackers to execute arbitrary SQL commands via the (1) addip parameter to cgi-bin/scrut_fa_exclusions.cgi, (2) getPermissionsAndPreferences parameter to cgi-bin/login.cgi, or (3) possibly certain parameters to d4d/alarms.php as demonstrated by the search_str parameter.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/52989 | Third Party Advisory VDB Entry |
http://www.exploit-db.com/exploits/18750 | Exploit Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74826 | Third Party Advisory VDB Entry |
http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html | Exploit Third Party Advisory |
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/twsl2012-008-multiple-vulnerabilities-in-scrutinizer-netflow-sflow-analyzer/ | Third Party Advisory |
Configurations
Information
Published : 2020-01-09 12:15
Updated : 2020-01-24 11:19
NVD link : CVE-2012-1259
Mitre link : CVE-2012-1259
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
plixer
- scrutinizer_netflow_\&_sflow_analyzer