Description
SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
Exploits (1)
exploitdb
WORKING POC
by Pedro Ribeiro · textwebappshardware
https://www.exploit-db.com/exploits/43885
References (5)
Core 5
Core References
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/Jun/8
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/535679/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/75035
Exploit x_refsource_misc
http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html
Vendor Advisory x_refsource_confirm
https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk
Scores
EPSS
0.1371
EPSS Percentile
94.3%
Details
CWE
CWE-255
Status
published
Products (1)
sysaid/sysaid
< 15.1
Published
Jun 08, 2015
Tracked Since
Feb 18, 2026