{ "id": "CVE-2009-1208", "sourceIdentifier": "cve@mitre.org", "published": "2009-04-01T10:30:00.360", "lastModified": "2025-04-09T00:30:58.490", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in auth2db 0.2.5, and possibly other versions before 0.2.7, uses the addslashes function instead of the mysql_real_escape_string function, which allows remote attackers to conduct SQL injection attacks using multibyte character encodings." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en auth2db v0.2.5 y posiblemente otras versiones anteriores a la v0.2.7, emplea la funci\u00f3n addslashes en vez de mysql_real_escape_string, lo que permite a atacantes remotos llevar a cabo ataques de inyecci\u00f3n SQL usando codificaciones de caracteres multibyte." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-89" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7ADBE959-5BD2-4F1C-B661-B7CFFFB7AA52" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D75A90F6-62CF-41C3-A8ED-D9B1F2B0E8DA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C892EC6A-A4BB-4985-AD36-1B3109649130" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F874A8E-890E-43E3-A2B1-6405541D9960" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "44B108BC-10AE-486A-A609-2E96DB094557" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "96EE7BE6-882D-4B2A-AB7B-4C3C9F79A836" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "F8B5F172-9E20-49E8-A337-85C46F85CBDB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "576B8177-220D-4D9B-A7B9-F6972751D0D7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "743F3844-D07B-4031-BC79-9723FB1EE7C2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9364AFFB-1718-4C7B-A2F0-826883E53D54" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "67ACADB2-A81D-4617-9039-6DD7C5DC4B41" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "06E6DEC0-36A5-4A4B-BD55-11538713EA87" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EFCB393B-EFAD-4C01-B43B-738E73B5842F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "85462ABB-BCBB-4528-962A-FB4CF44D961A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "70D14ACC-ECEE-4CB7-B7E8-D4565DD46D38" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2db:auth2db:0.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "9A1842BC-FF1E-4AEC-8B48-B15FF888CAFA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:auth2dbauth2db:0.1.1:*:*:*:*:*:*:*:*", "matchCriteriaId": "50EB40E3-1A47-4A0E-BF48-E33D0D64F49B" } ] } ] } ], "references": [ { "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521823", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://secunia.com/advisories/34488", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.auth2db.com.ar/?title=CHANGELOG", "source": "cve@mitre.org" }, { "url": "http://www.debian.org/security/2009/dsa-1757", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://www.securityfocus.com/bid/34287", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49518", "source": "cve@mitre.org" }, { "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521823", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] }, { "url": "http://secunia.com/advisories/34488", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.auth2db.com.ar/?title=CHANGELOG", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.debian.org/security/2009/dsa-1757", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] }, { "url": "http://www.securityfocus.com/bid/34287", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49518", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }