SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
References
Configurations
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2015/Jun/8 - Exploit | |
References | () http://www.securityfocus.com/archive/1/535679/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/75035 - | |
References | () https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk - Vendor Advisory |
Information
Published : 2015-06-08 14:59
Updated : 2024-11-21 02:28
NVD link : CVE-2015-3001
Mitre link : CVE-2015-3001
CVE.ORG link : CVE-2015-3001
JSON object : View
Products Affected
sysaid
- sysaid
CWE
CWE-255
Credentials Management Errors