HTTP: ScozNet ScozBook AdminName Variable SQL Injection

This signature detects attempts to exploit a known SQL injection vulnerability in the ScozNet ScozBook AdminName Variable. It is due to insufficient validation of a parameter sent to the auth.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Extended Description

ScozNet ScozBook is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Affected Products

Scoznet scozbook

References

BugTraq: 16115

CVE: CVE-2006-0079

Short Name
HTTP:SQL:INJ:SCOZNET-ADMINNAME
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
AdminName CVE-2006-0079 Injection SQL ScozBook ScozNet Variable bid:16115
Release Date
05/03/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Scoznet

CVSS Score

7.5

Found a potential security threat?