Solved

CGI Generic SQL Injection (blind, time based) - Exchange vulnerability

Posted on 2016-09-06
6
29 Views
Last Modified: 2016-09-11
We have used Nessus to scan for vulnerabilities on our externally facing Exchange 2013 server and it has reported the following:

CGI Generic SQL Injection (blind, time based)
Test Id: 43160
Severity:3 / High
Description: By sending specially crafted parameters to one or more CGI scripts hosted on the remote web server, Nessus was able to get a slower response, which suggests that it may have been able to modify the behavior of the application and directly access the underlying database. An attacker may be able to exploit this issue to bypass authentication, read confidential data, modify the remote database, or even take control of the remote operating system. Note that this script is experimental and may be prone to false positives.

I can't see any further information or find any fix, does anyone know specifically what this is referring too and if so what we can do to resolve it (closing ports 80 + 443 isn't an option).

Exchange V15.0 Build - 1130.7

Thanks
0
Comment
Question by:Hallidays
  • 3
  • 3
6 Comments
 
LVL 45

Expert Comment

by:Vitor Montalvão
ID: 41785833
Looks like you're application allows user input that are used as parameters to query a database. The vulnerability is that if someone input SQL code to perform unwanted actions in your database.
Here's an article that can help you understand better the impact of SQL injection.
0
 
LVL 1

Author Comment

by:Hallidays
ID: 41785836
Hi Vitor,

I have done some research and can see how this could affect us but I cannot see any resolution to fix the issue. The external facing sites are OWA, ECP, Autodiscover etc from Exchange 2013, do you have any idea what in Exchange is allowing this and how we can stop it?

Thanks
0
 
LVL 45

Expert Comment

by:Vitor Montalvão
ID: 41785845
The external facing sites are OWA, ECP, Autodiscover etc from Exchange 2013, do you have any idea what in Exchange is allowing this and how we can stop it?
Unfortunally not. Exchange is not my area of expertise.
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 
LVL 1

Accepted Solution

by:
Hallidays earned 0 total points
ID: 41785977
Hi all,

This has been confirmed as a false positive result so panic over. Thanks anyway
0
 
LVL 45

Expert Comment

by:Vitor Montalvão
ID: 41786012
Good to know :)
Cheers
0
 
LVL 1

Author Closing Comment

by:Hallidays
ID: 41793235
The result was a false positive and doesn't actually exist.
0

Featured Post

Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

Join & Write a Comment

Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
For both online and offline retail, the cross-channel business is the most recent pattern in the B2C trade space.
Viewers will learn how to use the SELECT statement in SQL to return specific rows and columns, with various degrees of sorting and limits in place.
Viewers will learn how to use the SELECT statement in SQL and will be exposed to the many uses the SELECT statement has.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now