{"vuid":"VU#394540","idnumber":"394540","name":"Sabre AirCentre Crew solutions contain a SQL injection vulnerability","keywords":["sabre","sql injection","cwe-89"],"overview":"Sabre AirCentre Crew solutions version 2010.2.12.20008 and earlier contain an SQL injection vulnerability.","clean_desc":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') \nSabre AirCentre Crew solutions version 2010.2.12.20008 and earlier are vulnerable to an SQL Injection attack in the username and password fields in CWPLogin.aspx. Various AirCentre Crew solutions may be affected, and other products (such as AirCentre Enterprise Operations) that include AirCentre Crew solutions may also be affected.","impact":"A remote attacker may be able to bypass authentication and access the system as an administrative user.","resolution":"Apply an Update\nSabre has provided an upgraded release for customers to address this vulnerability. Customers should contact Sabre for upgrade information. It is not clear if upgrades are available for older versions.","workarounds":"Restrict Access\nLimit access to AirCentre Crew solutions to trusted hosts and networks, for example, using network or web server access controls, or running solutions within an intranet or VPN. Detect and Block SQLi Attacks\nWeb Application Firewall (WAF) or other filtering technology may be able to detect and block SQLi attacks.","sysaffected":"","thanks":"Thanks to Youssef Manar for reporting this vulnerability.","author":"This document was written by Chris King.","public":["http://www.sabreairlinesolutions.com/home/software_solutions/product/crew_management/","http://cwe.mitre.org/data/definitions/89.html"],"cveids":["CVE-2014-4858"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-05-19T16:13:28Z","publicdate":"2014-07-25T00:00:00Z","datefirstpublished":"2014-07-25T14:21:40Z","dateupdated":"2014-07-25T18:17:50Z","revision":17,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"MH","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"5.9","cvss_environmentalscore":"5.63721963133046","cvss_environmentalvector":"CDP:MH/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}