Short Name |
HTTP:SQL:INJ:CA-TOTAL-UNCWS |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
CA Total Defense Suite UNCWS UnassignFunctionalRoles Stored Procedure SQL Injection |
Release Date |
2011/07/05 |
Update Number |
1949 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in CA Total Defense Suite UNCWS. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.
Computer Associates Total Defense is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. This may also allow an attacker to execute arbitrary commands through an 'exec()' function call with SYSTEM-level privileges, completely compromising an affected computer. Total Defense versions prior to 12 SE2 are affected.