Vulnerability Note VU#394540

Sabre AirCentre Crew solutions contain a SQL injection vulnerability

Original Release date: 25 Jul 2014 | Last revised: 25 Jul 2014

Overview

Sabre AirCentre Crew solutions version 2010.2.12.20008 and earlier contain an SQL injection vulnerability.

Description

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Sabre AirCentre Crew solutions version 2010.2.12.20008 and earlier are vulnerable to an SQL Injection attack in the username and password fields in CWPLogin.aspx. Various AirCentre Crew solutions may be affected, and other products (such as AirCentre Enterprise Operations) that include AirCentre Crew solutions may also be affected.

Impact

A remote attacker may be able to bypass authentication and access the system as an administrative user.

Solution

Apply an Update
Sabre has provided an upgraded release for customers to address this vulnerability. Customers should contact Sabre for upgrade information. It is not clear if upgrades are available for older versions.

Restrict Access
Limit access to AirCentre Crew solutions to trusted hosts and networks, for example, using network or web server access controls, or running solutions within an intranet or VPN.

Detect and Block SQLi Attacks
Web Application Firewall (WAF) or other filtering technology may be able to detect and block SQLi attacks.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Sabre Airline SolutionsAffected05 Jun 201425 Jul 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal 5.9 E:POC/RL:OF/RC:C
Environmental 5.6 CDP:MH/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Youssef Manar for reporting this vulnerability.

This document was written by Chris King.

Other Information

  • CVE IDs: CVE-2014-4858
  • Date Public: 25 Jul 2014
  • Date First Published: 25 Jul 2014
  • Date Last Updated: 25 Jul 2014
  • Document Revision: 15

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.