Description
Multiple SQL injection vulnerabilities in Dell KACE K1000 5.4.76847 and possibly earlier allow remote attackers or remote authenticated users to execute arbitrary SQL commands via the macAddress element in a (1) getUploadPath or (2) getKBot SOAP request to service/kbot_service.php; the ID parameter to (3) userui/advisory_detail.php or (4) userui/ticket.php; and the (5) ORDER[] parameter to userui/ticket_list.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Rohan Stelling · textwebappsphp
https://www.exploit-db.com/exploits/39057
References (4)
Core 4
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/56396
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/90592
Various Sources x_refsource_misc
http://www.baesystemsdetica.com.au/Research/Advisories/Dell-KACE-K1000-SQL-Injection-%28DS-2014-001%29
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/65029
Scores
EPSS
0.0034
EPSS Percentile
56.9%
Details
CWE
CWE-89
Status
published
Products (5)
dell/kace_k1000_systems_management_appliance
dell/kace_k1000_systems_management_appliance_software
5.4.76847
dell/kace_k1000_systems_management_virtual_appliance
dell/kace_k1100s_systems_management_appliance
dell/kace_k1200s_systems_management_appliance
Published
Jan 26, 2014
Tracked Since
Feb 18, 2026