A vulnerability and a weakness have been reported in E-Lite POS, which can be exploited by malicious people to enumerate valid user accounts or conduct SQL injection attacks.
1) Input passed to the "username" and potentially other parameters in default.asp is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation allows e.g. changing user names and passwords.
2) The script returns detailed error messages in case of a failed login attempt. This can be exploited to enumerate valid user accounts.
Solution: Edit the source code to ensure that input is properly sanitised and use less detailed error messages.
Provided and/or discovered by: 1) Aria-Security Team
2) An anonymous person
Original Advisory: http://aria-security.net/forum/showthread.php?p=1108#post1108
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: E-Lite POS Login SQL Injection Vulnerability and User Enumeration
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.