[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

CGI Generic SQL Injection (blind, time based) - Exchange vulnerability

Posted on 2016-09-06
6
Medium Priority
?
509 Views
Last Modified: 2016-09-11
We have used Nessus to scan for vulnerabilities on our externally facing Exchange 2013 server and it has reported the following:

CGI Generic SQL Injection (blind, time based)
Test Id: 43160
Severity:3 / High
Description: By sending specially crafted parameters to one or more CGI scripts hosted on the remote web server, Nessus was able to get a slower response, which suggests that it may have been able to modify the behavior of the application and directly access the underlying database. An attacker may be able to exploit this issue to bypass authentication, read confidential data, modify the remote database, or even take control of the remote operating system. Note that this script is experimental and may be prone to false positives.

I can't see any further information or find any fix, does anyone know specifically what this is referring too and if so what we can do to resolve it (closing ports 80 + 443 isn't an option).

Exchange V15.0 Build - 1130.7

Thanks
0
Comment
Question by:Hallidays
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 52

Expert Comment

by:Vitor Montalvão
ID: 41785833
Looks like you're application allows user input that are used as parameters to query a database. The vulnerability is that if someone input SQL code to perform unwanted actions in your database.
Here's an article that can help you understand better the impact of SQL injection.
0
 
LVL 1

Author Comment

by:Hallidays
ID: 41785836
Hi Vitor,

I have done some research and can see how this could affect us but I cannot see any resolution to fix the issue. The external facing sites are OWA, ECP, Autodiscover etc from Exchange 2013, do you have any idea what in Exchange is allowing this and how we can stop it?

Thanks
0
 
LVL 52

Expert Comment

by:Vitor Montalvão
ID: 41785845
The external facing sites are OWA, ECP, Autodiscover etc from Exchange 2013, do you have any idea what in Exchange is allowing this and how we can stop it?
Unfortunally not. Exchange is not my area of expertise.
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 1

Accepted Solution

by:
Hallidays earned 0 total points
ID: 41785977
Hi all,

This has been confirmed as a false positive result so panic over. Thanks anyway
0
 
LVL 52

Expert Comment

by:Vitor Montalvão
ID: 41786012
Good to know :)
Cheers
0
 
LVL 1

Author Closing Comment

by:Hallidays
ID: 41793235
The result was a false positive and doesn't actually exist.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When trying to connect from SSMS v17.x to a SQL Server Integration Services 2016 instance or previous version, you get the error “Connecting to the Integration Services service on the computer failed with the following error: 'The specified service …
Want to know how to use Exchange Server Eseutil command? Go through this article as it gives you the know-how.
Via a live example, show how to shrink a transaction log file down to a reasonable size.
Via a live example, show how to setup several different housekeeping processes for a SQL Server.

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question