SQL injection vulnerability in the logon screen of the web front end (NmConsole/Login.asp) for IpSwitch WhatsUp Professional 2005 SP1 allows remote attackers to execute arbitrary SQL commands via the (1) User Name field (sUserName parameter) or (2) Password (sPassword parameter).
Link | Tags |
---|---|
http://secunia.com/secunia_research/2005-13/advisory/ | |
http://www.idefense.com/application/poi/display?id=268&type=vulnerabilities | third party advisory patch vendor advisory |
http://www.ipswitch.com/forums/shwmessage.aspx?ForumID=20&MessageID=7699 | patch vendor advisory |
http://www.corsaire.com/advisories/c050323-001.txt |