The specific flaw exists within the batchlist report page. When parsing the 'to' parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose sensitive information under the context of the current process.
Ecava has issued an update to correct this vulnerability. More details can be found at:
|Steven Seeley of Source Incite
Michael DePlante and Brad Taylor