SalesLogix.View.id.Parameter.Handling.SQL.Injection
Description
This indicates an attack attempt to exploit a SQL Injection vulnerability in SalesLogix.
The vulnerability is caused by a lack of sanitization of the "id" parameter that is passed to "view". A remote attacker can exploit this to send a crafted query to execute SQL commands on a vulnerable server.
Affected Products
SalesLogix Corporation SalesLogix 6.1.
Impact
System Compromise: Remote attackers can add, view, delete or modify data in the database of the affected application
Recommended Actions
Apply appropriate patch from the vendor.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |