2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-4791" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2010-04-22T14:30:00.463" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:10:27.800" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple SQL injection vulnerabilities in Family Connections (aka FCMS) before 1.8.2 allow remote attackers to execute arbitrary SQL commands via the (1) letter parameter to addressbook.php, (2) id parameter to recipes.php, (3) year parameter to register.php, (4) poll_id parameter to home.php, and (5) email parameter to lostpw.php."
} ,
{
"lang" : "es" ,
"value" : "Multiples vulnerabilidades de inyecci\u00f3n SQL en Family Connections (FCMS) en versiones anteriores a la v1.8.2 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros (1) letter de addressbook.php, (2) id de recipes.php, (3) year de register.php, (4) poll_id de home.php, y (5) email de lostpw.php."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.8.1" ,
"matchCriteriaId" : "4AAA6B57-E936-471B-86B8-B10B735614A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA509908-BAAB-4FEE-BFCF-66F972284D9E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "24B23881-2C8D-405F-9707-7064CAF2076F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4AF1AE86-FE99-43CA-988A-78CAD57F26DC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D165CCF-BF8B-4BD8-B1D3-6FA671012555"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5729DE6B-8DE4-461A-8E02-F22C56DE6408"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "212070C7-B670-44EA-9F81-D67F605E944B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C78C3E6D-6D8C-4C7F-A977-7E5966AE2386"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F85CDEA-DF6E-4B1B-9AF6-9B42228684B2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A769ACB2-0A8D-4F6D-858B-D38BC53D00A9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AAE7B2DA-20D3-44A4-B34C-9B134A2EB492"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "52B31824-E432-4732-9041-C633F53E994B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A523F1EA-6AF4-465A-BED6-1F8C7D001D56"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A70F3155-0155-45BE-8D35-C13C012E434C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "092B8C26-6628-4910-88C7-903536828F6F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE73C91C-C2DC-499F-B64B-CFA6D0ACF5D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AC06DCA4-36C8-43EA-BE4D-665857C0A58B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "09AF2E34-3ACC-4712-8CFC-B215793BB1D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "48BEBA87-8685-4E5B-9A10-ED658BACD020"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "423E786D-1619-4292-BC5E-0B0EE535C3E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1D658A6A-35FE-44FF-9148-DFBA453D0006"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "150284F5-FB0D-4E09-BEE9-11D037C2C2F9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C4EDE49A-40DF-4CAA-8E0A-9D4E88DE67B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8B688361-A6A1-41AE-88C1-FD244FCC1E20"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0E4BD989-7EC2-4B0E-B728-BBE13731B5D8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3783EA4C-A416-4E68-8C3E-B18CA71359FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C42088E-ECC8-4BD1-B6CA-9B04896996EC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "25107E51-AC63-4E52-972D-5ED8D23863F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D15350F-0283-4CE0-89B9-F8642FE666C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E76D58EA-FC16-4B2F-9AC5-14431316D0DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5CD529C5-38D3-43FC-8233-67EF3577AE3D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ryan_haudenschilt:family_connections:1.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1027CE9C-C048-4735-A3D4-2C329AD64131"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/34503" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://sourceforge.net/project/shownotes.php?release_id=672266" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://sourceforge.net/tracker/?func=detail&aid=2722736&group_id=189733&atid=930513" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.exploit-db.com/exploits/8319" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.familycms.com/blog/2009/03/fcms-182-released/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/502272/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/34297" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch"
]
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://secunia.com/advisories/34503" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://sourceforge.net/project/shownotes.php?release_id=672266" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://sourceforge.net/tracker/?func=detail&aid=2722736&group_id=189733&atid=930513" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.exploit-db.com/exploits/8319" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.familycms.com/blog/2009/03/fcms-182-released/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/502272/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/34297" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Patch"
]
2023-04-24 12:24:31 +02:00
}
]
}