Description
WebUpgrade in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and create a system backup tarball, restart the server, or stop the filters on the server via a ' (single quote) character in the login and password parameters to webupgrade/webupgrade.php. NOTE: this was originally reported as an SQL injection vulnerability, but this may be inaccurate.
Exploits (1)
exploitdb
WORKING POC
by Anastasios Monachos · textwebappsphp
https://www.exploit-db.com/exploits/37928
References (4)
Core 4
Core References
Patch, Vendor Advisory x_refsource_confirm
https://helpdesk.netsweeper.com/docs/4.1/release_notes/netsweeper_releasenotes/4_1_release_notes/4_1_2_release_notes/4.1.2_release_notes.htm
Patch, Vendor Advisory x_refsource_confirm
https://helpdesk.netsweeper.com/docs/3.1/release_notes/netsweeper_releasenotes/3_1_10_0_release_notes/3.1.10_release_notes.htm
Exploit exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/37928/
Patch, Vendor Advisory x_refsource_confirm
https://helpdesk.netsweeper.com/docs/4.0/release_notes/netsweeper_releasenotes/4_0_9_release_notes/4.0.9_release_notes.htm
Scores
EPSS
0.0869
EPSS Percentile
92.5%
Details
CWE
CWE-287
Status
published
Products (1)
netsweeper/netsweeper
3.1.0 - 3.1.10
Published
Sep 04, 2015
Tracked Since
Feb 18, 2026