os4e contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the "Password" variable in the "login.asp" script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Discovery is credited to Dj romty <email@example.com>.
os4e is prone to an SQL injection vulnerability.
This issue is due to a failure in the application to properly sanitize user-supplied input to the 'login.asp' script before using it in an SQL query.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
All versions are considered to be vulnerable at the moment.
An exploit is not required.
The following proof of concept is available: Password= ' or ''='
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org <mailto:email@example.com>.