Layton Helpbox 4.4.0 Multiple SQL Injection Points by Joseph Sheridan
Layton Technologies Helpbox product version 4.4.0 is vulnerable to multiple SQL injection vulnerabilities.
- CVE number: CVE-2012-4971
- Impact: High
- Vendor homepage: http://www.laytontechnology.com
- Vendor notified: 10/09/2012
- Vendor response: This product has been replaced by 'ServiceDesk' but fixes may be available with valid support contracts.
- Credit: Joseph Sheridan of ReactionIS
The following pages and parameters were found to be vulnerable:
editrequestenduser.asp (reqclass) editrequestuser.asp (sys_request_id) enduseractions.asp (sys_request_id) enduserreopenrequeststatus.asp (sys_request_id, confirm) enduserrequests.asp (searchsql, back, status) validateenduserlogin.asp (POST param:sys_userpwd) validateuserlogin.asp (POST param:sys_userpwd) editenduseruser.asp (sql) manageenduserrequestclasses.asp (sql) resetpwdenduser.asp (sql) disableloginenduser.asp (sql) deleteenduseruser.asp (sql) manageendusers.asp (sql) statsrequestagereport.asp (POST param:site)
An attacker may be able to take full control of the application database and execute arbitrary operating-system commands.
Layton advise upgrading to their newer 'ServiceDesk' product. However, if you have an active support contract, Layton may be able to provide fixes for you.
Reaction Information Security is a leading independent pen test consultancy specialising in delivering the highest quality security testing services including network pen testing and web application security testing. As a CESG CHECK Service Provider we are authorised to carry out penetration testing on classified government networks.