CVE-2012-4971

Multiple SQL injection vulnerabilities in Layton Helpbox 4.4.0 allow remote attackers to execute arbitrary SQL commands via the (1) reqclass parameter to editrequestenduser.asp; the (2) sys_request_id parameter to editrequestuser.asp; the (3) sys_request_id parameter to enduseractions.asp; the (4) sys_request_id or (5) confirm parameter to enduserreopenrequeststatus.asp; the (6) searchsql, (7) back, or (8) status parameter to enduserrequests.asp; the (9) sys_userpwd parameter to validateenduserlogin.asp; the (10) sys_userpwd parameter to validateuserlogin.asp; the (11) sql parameter to editenduseruser.asp; the (12) sql parameter to manageenduserrequestclasses.asp; the (13) sql parameter to resetpwdenduser.asp; the (14) sql parameter to disableloginenduser.asp; the (15) sql parameter to deleteenduseruser.asp; the (16) sql parameter to manageendusers.asp; or the (17) site parameter to statsrequestagereport.asp.
Configurations

Configuration 1 (hide)

cpe:2.3:a:layton_technology:helpbox:4.4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:43

Type Values Removed Values Added
References () http://www.reactionpenetrationtesting.co.uk/helpbox-sql-injection.html - Exploit () http://www.reactionpenetrationtesting.co.uk/helpbox-sql-injection.html - Exploit

Information

Published : 2012-12-12 11:38

Updated : 2024-11-21 01:43


NVD link : CVE-2012-4971

Mitre link : CVE-2012-4971

CVE.ORG link : CVE-2012-4971


JSON object : View

Products Affected

layton_technology

  • helpbox
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')