Multiple SQL injection vulnerabilities in NetCracker Resource Management System before 8.2 allow remote authenticated users to execute arbitrary SQL commands via the (1) ctrl, (2) h____%2427, (3) h____%2439, (4) param0, (5) param1, (6) param2, (7) param3, (8) param4, (9) filter_INSERT_COUNT, (10) filter_MINOR_FALLOUT, (11) filter_UPDATE_COUNT, (12) sort, or (13) sessid parameter.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/132808/NetCracker-Resource-Management-System-8.0-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/archive/1/536054/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/132808/NetCracker-Resource-Management-System-8.0-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/archive/1/536054/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/132808/NetCracker-Resource-Management-System-8.0-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/archive/1/archive/1/536054/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry |
Information
Published : 2020-02-08 18:15
Updated : 2024-11-21 02:29
NVD link : CVE-2015-3423
Mitre link : CVE-2015-3423
CVE.ORG link : CVE-2015-3423
JSON object : View
Products Affected
netcracker
- resource_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')