SQL Injection in Orbit Open Ad Server
Advisory ID: | HTB23208 |
Product: | Orbit Open Ad Server |
Vendor: | OrbitScripts, LLC |
Vulnerable Versions: | 1.1.0 and probably prior |
Tested Version: | 1.1.0 |
Advisory Publication: | March 19, 2014 [without technical details] |
Vendor Notification: | March 19, 2014 |
Vendor Fix: | March 21, 2014 |
Public Disclosure: | April 9, 2014 |
Latest Update: | April 8, 2014 |
Vulnerability Type: | SQL Injection [CWE-89] |
CVE Reference: | CVE-2014-2540 |
Risk Level: | High |
CVSSv2 Base Score: | 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) |
Solution Status: | Fixed by Vendor |
Discovered and Provided: | High-Tech Bridge Security Research Lab |
Advisory Details: | |
High-Tech Bridge Security Research Lab discovered vulnerability in Orbit Open Ad Server, which can be exploited to perform SQL Injection attacks, alter SQL requests to database of vulnerable application and potentially gain control over the vulnerable website. | |
Solution: | |
Update to Orbit Open Ad Server 1.1.1 | |
References: | |
[1] High-Tech Bridge Advisory HTB23208 - https://www.immuniweb.com/advisory/HTB23208 - SQL Injection in Orbit Open Ad Server. [2] Orbit Open Ad Server - http://orbitopenadserver.com/ - the free, open source ad tool that lets you manage the profits while we manage the technology. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. [5] ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing. [6] ImmuniWeb® SSLScan - Test your servers for security and compliance with PCI DSS, HIPAA and NIST. | |
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.