mailing list archives
hornbill supportworks SQL injection
From: "research" <research () reactionis co uk>
Date: Wed, 24 Apr 2013 10:54:00 +0100
SQL Injection Vulnerability in ITSM component of Hornbill Supportworks
CVE number: CVE-2013-2594
Vendor homepage: http://www.hornbill.com
Vendor notified: 19/11/2012
Vendor response: This issue has reportedly been fixed but the vendor
refused to give version details.
Credit: Joseph Sheridan of ReactionIS
Supportworks ITSM versions 1.0.0 and possibly other versions
There is a SQL injection vulnerability in the ITSM component of the
Supportworks Application. The vulnerable file is calldiary.php found in the
/reports folder of the webroot. The following URL demonstrates the issue:
This attack can be used to take full control of the host by writing a php
webshell document (using mysql 'into outfile') to the webroot.
An attacker may be able to take full control of the Supportworks server and
execute arbitrary operating-system commands.
Upgrade to the latest available ITSM version - contact Vendor for more
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- hornbill supportworks SQL injection research (Apr 24)