Vulnerability Details : CVE-2012-3951
Public exploit exists!
The MySQL component in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) 9.0.1.19899 and earlier has a default password of admin for the (1) scrutinizer and (2) scrutremote accounts, which allows remote attackers to execute arbitrary SQL commands via a TCP session.
Vulnerability category: Sql Injection
Products affected by CVE-2012-3951
- cpe:2.3:a:sonicwall:scrutinizer:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-3951
86.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2012-3951
-
Plixer Scrutinizer NetFlow and sFlow Analyzer 9 Default MySQL Credential
Disclosure Date: 2012-07-27First seen: 2020-04-26exploit/windows/mysql/scrutinizer_upload_execThis exploits an insecure config found in Scrutinizer NetFlow & sFlow Analyzer. By default, the software installs a default password in MySQL, and binds the service to "0.0.0.0". This allows any remote user to login to MySQL, and then gain arbitrary remote code exec
CVSS scores for CVE-2012-3951
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2012-3951
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3951
-
http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html
Press Release Archive – PlixerThird Party Advisory
-
https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt
404 Not Found | TrustwaveExploit;Third Party Advisory
Jump to