{"vuid":"VU#869702","idnumber":"869702","name":"Avanset Visual CertExam Manager 3.3 SQL injection vulnerability","keywords":["certexam","avanset","sqli","cwe-89"],"overview":"Avanset Visual CertExam Manager version 3.3 and below contain a SQL injection vulnerability.","clean_desc":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Avanset Visual CertExam Manager version 3.3 and below contain a SQL injection vulnerability due to the application failing to validate user input variables. It has been reported that the fields \"Title\", \"File name\", and \"Candidate Name\" are all vulnerable to SQL injection.","impact":"An authenticated attacker can read or modify data in the application database.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"Restrict Access Enable firewall rules to restrict access to the Avanset Visual CertExam Manager from external untrusted sources.","sysaffected":"","thanks":"Thanks to security researcher Mr. Aung Khant (aungkhant0911@gmail.com) for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["http://www.avanset.com/products/visual-certexam-suite.html","http://cwe.mitre.org/data/definitions/89.html"],"cveids":["CVE-2013-7175"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-12-02T13:19:16Z","publicdate":"2014-01-17T00:00:00Z","datefirstpublished":"2014-01-23T11:38:53Z","dateupdated":"2014-07-24T22:11:16Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UR","cvss_collateraldamagepotential":"N","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.5","cvss_basevector":"AV:N/AC:L/Au:S/C:P/I:P/A:P","cvss_temporalscore":"5.6","cvss_environmentalscore":"1.39424533067531","cvss_environmentalvector":"CDP:N/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}