7.5
CVSSv2

CVE-2016-6566

Published: 13/07/2018 Updated: 09/10/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The valueAsString parameter inside the JSON payload contained by the ucLogin_txtLoginId_ClientStat POST parameter of the Sungard eTRAKiT3 software version 3.2.1.17 is not properly validated. An unauthenticated remote attacker may be able to modify the POST request and insert a SQL query which may then be executed by the backend server. eTRAKiT 3.2.1.17 was tested, but other versions may also be vulnerable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sungardas etrakit3 3.2.1.17

Exploits

Software: Sungard eTRAKiT3 Version: 32117 and possibly lower CVE: CVE-2016-6566 (wwwkbcertorg/vuls/id/846103) Vulnerable Component: Login page Description ================ The login form is vulnerable to blind SQL injection by an unauthenticated user Vulnerabilities ================ The "valueAsString" parameter inside the JSON ...