{ "id": "CVE-2008-6188", "sourceIdentifier": "cve@mitre.org", "published": "2009-02-19T18:30:00.390", "lastModified": "2017-10-19T01:30:16.380", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in people/editprofile.php in Gforge 4.6 rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the skill_edit[] parameter." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en people/editprofile.php en Gforge 4.6 rc1 y anteriores, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro \"skill_edit[]\"." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-89" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.6rc1", "matchCriteriaId": "5079CD15-7319-4562-BB50-B72762FAD729" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "308956E3-6EF6-4EFD-BCDF-9AE07BDE79F6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DF5AB4B-9002-49FD-A02E-9537C73D97ED" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DDE3B595-4902-4A29-83CC-B05932605B61" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3C5E4D8-0B12-4026-9818-173ADA040C67" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:3.21:*:*:*:*:*:*:*", "matchCriteriaId": "E11701B3-7DF7-4E2A-8D6C-8C97970B1145" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "542842B0-9FD5-48A8-915E-59F030FED57F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "8C25B797-E971-4AE9-9BDC-49D69C590D78" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:4.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "71D47383-4F0C-4B8F-AB82-0B5D3F0A8602" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:4.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "8EDC6925-3E72-4F87-897E-7D8556C6E5F8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:4.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "AC89AC0A-3CC5-489C-ADA2-028CD9001F99" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "96E41168-4BBA-4837-A025-5B6C12CB039B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gforge:gforge:4.6_b2:*:*:*:*:*:*:*", "matchCriteriaId": "691B3232-1FC6-429D-BD86-9CDE38C2D771" } ] } ] } ], "references": [ { "url": "http://gforge.org/tracker/index.php?func=detail&aid=5554&group_id=1&atid=105", "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/31674", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48851", "source": "cve@mitre.org" }, { "url": "https://www.exploit-db.com/exploits/6708", "source": "cve@mitre.org" } ] }