### [CVE-2016-6566](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6566) ![](https://img.shields.io/static/v1?label=Product&message=eTRAKiT3&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.2.1.173.2.1.17%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89&color=brighgreen) ### Description The valueAsString parameter inside the JSON payload contained by the ucLogin_txtLoginId_ClientStat POST parameter of the Sungard eTRAKiT3 software version 3.2.1.17 is not properly validated. An unauthenticated remote attacker may be able to modify the POST request and insert a SQL query which may then be executed by the backend server. eTRAKiT 3.2.1.17 was tested, but other versions may also be vulnerable. ### POC #### Reference - https://www.kb.cert.org/vuls/id/846103 #### Github No PoCs found on GitHub currently.