Multiple SQL injection vulnerabilities in NetCracker Resource Management System before 8.2 allow remote authenticated users to execute arbitrary SQL commands via the (1) ctrl, (2) h____%2427, (3) h____%2439, (4) param0, (5) param1, (6) param2, (7) param3, (8) param4, (9) filter_INSERT_COUNT, (10) filter_MINOR_FALLOUT, (11) filter_UPDATE_COUNT, (12) sort, or (13) sessid parameter.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/archive/1/536054/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/132808/NetCracker-Resource-Management-System-8.0-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-02-08 10:15
Updated : 2020-02-12 10:32
NVD link : CVE-2015-3423
Mitre link : CVE-2015-3423
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
netcracker
- resource_management_system