Multiple SQL injection vulnerabilities in Scout Portal Toolkit (SPT) 1.3.1 and previous versions allow remote malicious users to execute arbitrary SQL commands via (1) the ParentId parameter in SPT--BrowseResources.php, (2) ResourceId parameter in SPT--FullRecord.php, (3) ResourceOffset parameter in SPT--Home.php, and (4) F_UserName and (5) F_Password in SPT--UserLogin.php. NOTE: it was later reported that vector 1 is also present in 1.4.0.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
internet scout scout portal toolkit 1.3.0_beta |
||
internet scout scout portal toolkit |
||
internet scout project scout portal toolkit 1.4.0 |