TippingPoint Zero Day Initiative

Ecava IntegraXor Report summary SQL Injection Remote Code Execution Vulnerability

ZDI-16-238: April 12th, 2016


CVSS Score

Affected Vendors

Affected Products

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Ecava IntegraXor. Authentication is not required to exploit this vulnerability.

The specific flaw exists in the handling of summary report requests. The vulnerability is caused by the lack of input validation before using remotely supplied strings to construct SQL queries. By sending a specially crafted request to a vulnerable system, an unauthenticated remote attacker can exploit this vulnerability to execute arbitrary code in the context of the process.

Vendor Response

Ecava states:

Ecava has produced a new release that addresses the reported vulnerabilities, as well as some identified security risks, in Version 5.0, build 4522. http://www.integraxor.com/download/beta.msi?5.0.4522.2 and https://ics-cert.us-cert.gov/advisories/ICSA-16-105-03

Disclosure Timeline

    2015-09-22 - Vulnerability reported to vendor
    2016-04-12 - Coordinated public release of advisory


This vulnerability was discovered by:
    Steven Seeley of Source Incite