Vulnerabilities > CVE-2005-1250 - Unspecified vulnerability in Ipswitch Whatsup Professional2005Sp1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
SQL injection vulnerability in the logon screen of the web front end (NmConsole/Login.asp) for IpSwitch WhatsUp Professional 2005 SP1 allows remote attackers to execute arbitrary SQL commands via the (1) User Name field (sUserName parameter) or (2) Password (sPassword parameter).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Ipswitch WhatsUp Professional 2005 SP1 LOGIN.ASP SQL Injection Vulnerability. CVE-2005-1250. Webapps exploit for asp platform |
id | EDB-ID:25874 |
last seen | 2016-02-03 |
modified | 2005-06-22 |
published | 2005-06-22 |
reporter | anonymous |
source | https://www.exploit-db.com/download/25874/ |
title | Ipswitch WhatsUp Professional 2005 SP1 LOGIN.ASP SQL Injection Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | IPSWITCH_WHATSUP_LOGIN_SQL_INJECTION.NASL |
description | The remote host is running Ipswitch WhatsUp Professional, a network management and monitoring package. The web front-end for WhatsUp Professional on the remote host is prone to a SQL injection attack because it fails to sanitize the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18552 |
published | 2005-06-23 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18552 |
title | Ipswitch WhatsUp Professional Login.asp Multiple Field SQL Injection |
code |
|
References
- http://secunia.com/secunia_research/2005-13/advisory/
- http://secunia.com/secunia_research/2005-13/advisory/
- http://www.corsaire.com/advisories/c050323-001.txt
- http://www.corsaire.com/advisories/c050323-001.txt
- http://www.idefense.com/application/poi/display?id=268&type=vulnerabilities
- http://www.idefense.com/application/poi/display?id=268&type=vulnerabilities
- http://www.ipswitch.com/forums/shwmessage.aspx?ForumID=20&MessageID=7699
- http://www.ipswitch.com/forums/shwmessage.aspx?ForumID=20&MessageID=7699