HackDig : Dig high-quality web security articles for hackers

[CVE-2017-7952] SQL injection in INFOR EAM V11.0 Build 201410 search fields (web/base/..) via filtervalue parameter

2017-05-15 15:20
SQL injection in INFOR EAM V11.0 Build 201410 search fields (web/base/..) 
via filtervalue parameter
Assigned CVE: CVE-2017-7952

Reproduction steps:
1. Log in with your EAM account
2. Go to any page with a search or filter field in it (for example
3. Make any search and intercept the request with a proxy
4. In the intercepted request, replace the value of "filteroperator"
parameter with IN.
5. The "filtervalue" become vulnerable to SQL Injection



Since the SQL injection vulnerability is available for any logged users, an
attacker needs a valid credential to exploit that vulnerability. By
exploiting that SQL Injection the attacker could obtain any available data
(even if they don’t belongs directly to him), eventually deleting and
replacing data as well.

This vulnerability allows full database access. It includes sensitive
information that normally should be accessed by specific users.
An attacker could dump the user table, which contains usernames and
password hashes, and proceed to bruteforcing passwords offline and could
possibly obtain administrative credentials, or could access private files
or personal details such as: telephone numbers, physical address and
private assets.
Obtaining administrative credentials would allow an attacker to perform
actions like: add or deleting users, jobs, and everything else an admin can
By having access to sensible information the attacker could eventually
pivoting them to perform further attacks on different target assets.

Disclosure timeline

26.04.2017 Vulnerability reported to vendor
15.05.2017 Advisory published

Sent through the Full Disclosure mailing list
Web Archives & RSS: http://seclists.org/fulldisclosure/

Source: 55/yaM/7102/erusolcsidlluf/gro.stsilces

Read:2685 | Comments:0 | Tags:No Tag

“[CVE-2017-7952] SQL injection in INFOR EAM V11.0 Build 201410 search fields (web/base/..) via filtervalue parameter”0 Comments

Submit A Comment



Blog :

Verification Code:


Tag Cloud