Vulnerability Description
SQL injection vulnerability in default.asp (aka the Login Page) in VU Case Manager allows remote attackers to execute arbitrary SQL commands via the password parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vu | Case Manager | All versions |
Related Weaknesses (CWE)
References
- http://aria-security.net/forum/showthread.php?t=448Exploit
- http://secunia.com/advisories/27779Vendor Advisory
- http://www.securityfocus.com/archive/1/484019/100/0/threaded
- http://www.securityfocus.com/bid/26523
- http://www.vupen.com/english/advisories/2007/3967
- http://aria-security.net/forum/showthread.php?t=448Exploit
- http://secunia.com/advisories/27779Vendor Advisory
- http://www.securityfocus.com/archive/1/484019/100/0/threaded
- http://www.securityfocus.com/bid/26523
- http://www.vupen.com/english/advisories/2007/3967
FAQ
What is CVE-2007-6143?
CVE-2007-6143 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in default.asp (aka the Login Page) in VU Case Manager allows remote attackers to execute arbitrary SQL commands via the password parameter.
How severe is CVE-2007-6143?
CVE-2007-6143 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6143?
Check the references section above for vendor advisories and patch information. Affected products include: Vu Case Manager.