cve/2016/CVE-2016-6566.md
2024-06-18 02:51:15 +02:00

18 lines
892 B
Markdown

### [CVE-2016-6566](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6566)
![](https://img.shields.io/static/v1?label=Product&message=eTRAKiT3&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.2.1.173.2.1.17%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89&color=brighgreen)
### Description
The valueAsString parameter inside the JSON payload contained by the ucLogin_txtLoginId_ClientStat POST parameter of the Sungard eTRAKiT3 software version 3.2.1.17 is not properly validated. An unauthenticated remote attacker may be able to modify the POST request and insert a SQL query which may then be executed by the backend server. eTRAKiT 3.2.1.17 was tested, but other versions may also be vulnerable.
### POC
#### Reference
- https://www.kb.cert.org/vuls/id/846103
#### Github
No PoCs found on GitHub currently.