HTTP: SalesLogics Unauthenticated slxweb.dll Admin Access

This signature detects attempts to exploit a known vulnerability against the SalesLogix Eviewer Web Application. Attackers can remotely send maliciously formatted URL requests to execute administrative commands without authentication.

Extended Description

SalesLogix eViewer is a web application integrated with the SalesLogix 2000 package. eViewer will not perform authorization on administrative commands if they are requested directly in the URL. Therefore, the URL: http: //target/scripts/slxweb.dll/admin?command=shutdown will cause the slxweb.dll process to shutdown. Possibly other commands aside from 'shutdown' could be performed by a remote user as well. Although the slxweb.dll process will restart once a new query or session is issued, continually requesting the URL above will cause a denial of service. Additional notes: The program which issues administrative commands (slxweb.dll) is installed by default in the /scripts directory and cannot be relocated. In addition to this security concern, the package requires a user to change the default anonymous username (IUSR_{systemname}) in Microsoft IIS to 'slxwebuser' and grant it administrative privileges.

Affected Products

Saleslogix_corporation eviewer

References

BugTraq: 1089

CVE: CVE-2000-0278

Short Name
HTTP:PKG:SALESLOGIC-UNAUTH-ADMN
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Access Admin CVE-2000-0278 SalesLogics Unauthenticated bid:1089 slxweb.dll
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Saleslogix_corporation

CVSS Score

5.0

Found a potential security threat?