Layton Helpbox version 4.4.0 suffers from multiple remote SQL injection vulnerabilities.
6c5cc1580cd23e491855f8f601ab13345165ca92e85aa068fc7ba33c894be7fc
Layton Helpbox 4.4.0 Multiple SQL Injection Points by Joseph Sheridan
Summary
Layton Technologies Helpbox product version 4.4.0 is vulnerable to multiple SQL injection vulnerabilities.
CVE number: CVE-2012-4971
Impact: High
Vendor homepage: http://www.laytontechnology.com
Vendor notified: 10/09/2012
Vendor response: This product has been replaced by 'ServiceDesk' but fixes may be available with valid support contracts.
Credit: Joseph Sheridan of ReactionIS
Affected Products
Helpbox 4.4.0
Details
The following pages and parameters were found to be vulnerable:
editrequestenduser.asp (reqclass)
editrequestuser.asp (sys_request_id)
enduseractions.asp (sys_request_id)
enduserreopenrequeststatus.asp (sys_request_id, confirm)
enduserrequests.asp (searchsql, back, status)
validateenduserlogin.asp (POST param:sys_userpwd)
validateuserlogin.asp (POST param:sys_userpwd)
editenduseruser.asp (sql)
manageenduserrequestclasses.asp (sql)
resetpwdenduser.asp (sql)
disableloginenduser.asp (sql)
deleteenduseruser.asp (sql)
manageendusers.asp (sql)
statsrequestagereport.asp (POST param:site)
Impact
An attacker may be able to take full control of the application database and execute arbitrary operating-system commands.
Solution
Layton advise upgrading to their newer 'ServiceDesk' product. However, if you have an active support contract, Layton may be able to provide fixes for you.
About ReactionIS
Reaction Information Security is a leading independent pen test consultancy specialising in delivering the highest quality security testing services including network pen testing and web application security testing. As a CESG CHECK Service Provider we are authorised to carry out penetration testing on classified government networks.