Synopsis
The remote host is vulnerable to SQL injection.
Description
The scanner was able to send specially crafted input to one or more endpoints and parameters on the remote host that resulted in an injection into a SQL query, allowing arbitrary SQL statements to be executed on the remote host.
Solution
In the case of a third party product, the vendor should be notified of this vulnerability. In the case of a custom web application, the application should be updated to use parameterized queries, which prevent an attacker from being able to inject special characters that can be used to break out of the intended context and execute SQL statements.
Plugin Details
File Name: sqli_scanner.nbin
Supported Sensors: Nessus
Risk Information
CVSS Score Rationale: Sql injection score
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: manual
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
Vulnerability Information
Required KB Items: Settings/enable_web_app_tests