Cerberus Helpdesk 2.649 - 'addresses_export.php?queues' SQL Injection
Author: A. Ramos
type: webapps
platform: php
port:
date_added: 2005-12-27
date_updated: 2013-07-21
verified: 1
codes: CVE-2005-4427;OSVDB-21993
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/16062/info
Cerberus Helpdesk is prone to multiple cross-site scripting and SQL injection vulnerabilities. These issues are the result of inadequate validation of user-supplied input that will be included in site output or in SQL queries.
The cross-site scripting vulnerability may permit a remote attacker to steal cookie-based authentication credentials from legitimate users. Successful exploitation of SQL injection vulnerabilities could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
POST: /cerberus-gui/addresses_export.php
sid=c61ce82aa50569705dd774c33644446c&queues%5B%5D=[SQL]&delimiter=comma&file_type=screen&form_submit=x