{"vuid":"VU#406596","idnumber":"406596","name":"Askiaweb survey application contains multiple vulnerabilities","keywords":["askiaweb","xss","sqli","cwe-79","cwe-89"],"overview":"The Askiaweb survey application contains multiple vulnerabilities.","clean_desc":"The Askiaweb survey application contains multiple vulnerabilities. CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - CVE-2013-0123\nThe administration interface for the Askia web survey application (http://www.askia.com/askiaweb) is vulnerable to SQL injection (blind, time-based) on 2 different  parameters : https://[application]/WebProd/pages/pgHistory.asp [nHistoryId parameter]\nhttps://[application]/WebProd/pages/pgadmin.asp [OrderBy parameter] CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2013-0124\nThe administration interface is vulnerable to XSS on the following URLs and parameters : https://[application]/WebProd/cgi-bin/AskiaExt.dll [Number parameter]\nhttps://[application]/WebProd/cgi-bin/AskiaExt.dll [UpdatePage parameter] The CVSS scores below apply to  CVE-2013-0123.","impact":"An attacker with access to the Askiaweb survey application web interface can conduct a cross-site scripting or SQL injection attack, which could be used to result in information leakage, privilege escalation, and/or denial of service.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS, CSRF, or SQLi attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the Askiaweb survey application web interface using stolen credentials from a blocked network location.","sysaffected":"","thanks":"Thank you to the reporter that wishes to remain anonymous.","author":"This document was written by Michael Orlando.","public":["http://cwe.mitre.org/data/definitions/79.html","http://cwe.mitre.org/data/definitions/89.html","http://www.askia.com/askiaweb"],"cveids":["CVE-2013-0123","CVE-2013-0124"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-02-01T19:22:56Z","publicdate":"2013-03-18T00:00:00Z","datefirstpublished":"2013-03-20T12:01:08Z","dateupdated":"2014-07-30T18:47:47Z","revision":12,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.5","cvss_basevector":"AV:N/AC:L/Au:S/C:P/I:P/A:P","cvss_temporalscore":"5.3","cvss_environmentalscore":"1.32086399748188","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}