Description
|
|
Michal Blaszczak has discovered two vulnerabilities in astTECS Voice Logger for Call Center / Contact Center, which can be exploited by malicious people to disclose potentially sensitive information and conduct SQL injection attacks.
1) Input passed via the "xajaxargs[]" POST parameter to asttecs/manager_login.server.php (when "xajax" is set to "processForm" and "xajaxr" is set) is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) Input passed via the "path" GET parameter to asttecs/records1.php is not properly verified before being used. This can be exploited to download arbitrary files via directory traversal sequences.
The vulnerabilities are confirmed in version 2.0. Other versions may also be affected.
|