Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   WhatsUp Vendors:   Ipswitch
Ipswitch WhatsUp Professional Input Validation Hole in 'login.asp' Lets Remote Users Inject SQL Commands
SecurityTracker Alert ID:  1014271
SecurityTracker URL:
CVE Reference:   CVE-2005-1250   (Links to External Site)
Date:  Jun 23 2005
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2005 SP1
Description:   iDEFENSE reported a vulnerability in Ipswitch WhatsUp Professional. A remote user can inject SQL commands.

The web-based interface does not not properly validate user-supplied input in the 'User Name' and 'Password' fields in 'NmConsole/Login.asp'. A remote user can supply specially crafted parameter values to execute SQL commands on the underlying database. This can be exploited to obtain administrative privileges on the target system.

The web-based front end is not enabled by default.

Some demonstration exploit values are provided:

- 'UPDATE WebUser SET sPassword=DEFAULT WHERE sUserName='Admin'--

- 'UPDATE WebUser SET nUserRightsMask=-1 WHERE sUserName='guest'--

The vendor was notified on April 25, 2005.

The original advisory is available at:

Impact:   A remote user can execute SQL commands on the underlying database.
Solution:   The vendor has issued a fix as part of WhatsUp Professional 2005 SP1a.
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  iDEFENSE Security Advisory 06.22.05: IpSwitch WhatsUp Professional

IpSwitch WhatsUp Professional 2005 (SP1) SQL Injection Vulnerability

iDEFENSE Security Advisory 06.22.05
June 22, 2005


WhatsUp Professional 2005 SP1 is a network management solution for small
and mid sized organizations. Further information is available at:


Remote exploitation of a SQL injection vulnerability in IpSwitch Inc.'s
WhatsUp Professional 2005 Service Pack 1 could allow a remote attacker
to gain administrative access to the application.

The main logon screen for the web based front end does not properly
validate input, allowing for SQL injection attacks to occur. SQL
commands can be submitted through the "User Name" and "Password" fields	
on the default login page.

The web front end is not enabled by default and must be running for the
application to be vulnerable. It can be enabled under the "Configure",
"Program Options" menu by checking the "Enable web server on port [80]"

Exploit code for this vulnerability is unnecessary; the following SQL
injection attacks can be executed in the "User Name" field of the
http://[target]/NmConsole/Login.asp page:

Reset the Admin user password with a blank password:
- 'UPDATE WebUser SET sPassword=DEFAULT WHERE sUserName='Admin'--

Elevate Guest user privileges to Admin privileges:
- 'UPDATE WebUser SET nUserRightsMask=-1 WHERE sUserName='guest'--


Successful exploitation allows unauthenticated remote attackers to gain
administrative access to the WhatsUp Professional application. SQL
injection attacks can be used to either elevate the privileges of the
Guest user or to change/erase the password of the Admin user. Either
approach will provide a remote attacker with full administrative access
to the application. By default, the Guest user is enabled but has
limited access to the application and the account has a blank password.


iDEFENSE has confirmed the existence of this vulnerability against
WhatsUp Gold Professional 2005 SP1 running on Windows XP Professional


Disabling the web front end to WhatsUp Gold Professional 2005 (SP1) will
prevent the ability to exploit this vulnerability. It can be disabled
under the "Configure", "Program Options" menu by unchecking the "Enable
web server on port [80]" checkbox.


This vulnerability is addressed in WhatsUP Pro 2005 SP1a.

A change log detailing changes in SP1a is available at:


The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-1250 to this issue. This is a candidate for inclusion in
the CVE list (, which standardizes names for
security problems.


04/25/2005  Initial vendor notification
05/10/2005  Initial vendor response
06/22/2005  Coordinated public disclosure


The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research

Free tools, research and upcoming events


Copyright (c) 2005 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC