Summary
This host is installed with ClipShare and is prone to Multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to gain access to the password information and inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Multiple flaws are due to,
- storing sensitive information in the /siteadmin/login.php file as plaintext - Input passed via the 'urlkey' parameter to ugroup_videos.php script is not properly sanitised before being returned to the user.
Affected
ClipShare Version 4.1.4
References
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- AV Arcade 'ava_code' Cookie Parameter SQL Injection Vulnerability
- Atlassian JIRA FishEye and Crucible Plugins XML Parsing Unspecified Security Vulnerability
- ActualAnalyzer Lite 'ant' Cookie Parameter Remote Command Execution Vulnerability
- Atmail Multiple Unspecified Security Vulnerabilities.
- Apple Safari PDF Javascript Security Bypass Bypass Vulnerability