Vulnerability Details : CVE-2011-3688
Multiple SQL injection vulnerabilities in Sonexis ConferenceManager 9.3.14.0 allow remote attackers to execute arbitrary SQL commands via (1) the g parameter to Conference/Audio/AudioResourceContainer.asp or (2) the txtConferenceID parameter to Login/HostLogin.asp.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2011-3688
Probability of exploitation activity in the next 30 days: 0.11%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 44 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-3688
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2011-3688
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2011-3688
-
Sonexis 2012-08-17Version 9.3 Patch 12 and 10.0.40 Patch 2 were available to customers in early October 2011. V9.2.11 is no longer supported and customers with support are able to upgrade to our latest release which includes the fixes. All customers were notified of the vulnerabilities and the fixes in early October 2011.
-
http://securityreason.com/securityalert/8401
Sonexis ConferenceManager SQL Injection - CXSecurity.com
-
http://www.solutionary.com/index/SERT/Vuln-Disclosures/Sonexis-SQL-Injection.html
Solutions for Resilient Cybersecurity I NTT Security AmericasExploit
- cpe:2.3:a:sonexis:conferencemanager:9.3.14.0:*:*:*:*:*:*:*