Short Name |
HTTP:SQL:INJ:IMP |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Horde IMP Arbitrary SQL Injection |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Horde IMP version 2. Attackers can send a maliciously crafted URL to mailbox.php3, which can allow them perform arbitrary SQL queries and possibly gain complete server control.
It has been reported that Imp is prone to multiple SQL injection vulnerabilities. IMP, in some cases, does not sufficiently sanitize user-supplied input which is passed to SQL queries. As a result, it is possible to manipulate SQL queries. This may allow a remote attacker to modify query logic or potentially corrupt the database. Consequences will vary depending on the queries used and the capabilities of the underlying database implementation. These issues occur throughout the database command files for different database implementations, for example 'lib/db.pgsql'. SQL injection attacks may also potentially be used to exploit latent vulnerabilities in the underlying database implementation.