SiteEnable contains a flaw that may allow a remote attacker to inject arbitrary SQL queries. The issue is due to the 'sortby' parameter in the 'content.asp' script not being properly sanitized and may allow a remote attacker to inject or manipulate SQL queries.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Discovery is credited to Zinho <email@example.com>.
SiteEnable is reported prone to an SQL injection vulnerability.
This vulnerability could permit remote attackers to pass malicious input to database queries, resulting in modification of query logic or other attacks.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
All versions of SiteEnable are considered vulnerable at the moment.
No exploit is required.
The following proof of concept is available:
http://www.example.com/content.asp?do_search=0&keywords=contact&page_no=2&sortby=;SELECT%20* FROM bla bla--
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org <mailto:email@example.com>.