{ "id": "CVE-2009-4795", "sourceIdentifier": "cve@mitre.org", "published": "2010-04-22T14:30:00.637", "lastModified": "2024-11-21T01:10:28.960", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in Xlight FTP Server before 3.2.1, when ODBC authentication is enabled, allow remote attackers to execute arbitrary SQL commands via the (1) USER (aka username) or (2) PASS (aka password) command." }, { "lang": "es", "value": "Multiples vulnerabilidades de inyecci\u00f3n SQL en Xlight FTP Server en versiones anteriores a la v3.2.1, cuando la autenticaci\u00f3n ODBC est\u00e1 activada, permite a los usuarios remotos autenticados ejecutar comandos de su elecci\u00f3n SQL a trav\u00e9s del comando (1) USER (tambi\u00e9n conocido como username) o (2) PASS (password)." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-89" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.2", "matchCriteriaId": "34CEFF75-78C3-4BFD-9579-F35B2ED29958" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.60:*:*:*:*:*:*:*", "matchCriteriaId": "A095E2BA-9DDC-4437-94AE-CD8E842D6537" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.61:*:*:*:*:*:*:*", "matchCriteriaId": "3428DC26-7F45-4BBB-9480-C853FB33A163" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.62:*:*:*:*:*:*:*", "matchCriteriaId": "CCAAE010-65FB-498A-AA77-DD23CF69725A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.62a:*:*:*:*:*:*:*", "matchCriteriaId": "227A5BC0-A51A-46AF-B35F-3688BAD799DF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.64:*:*:*:*:*:*:*", "matchCriteriaId": "9174BB48-5BDF-4C25-9965-4F67D011B57D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.65:*:*:*:*:*:*:*", "matchCriteriaId": "62EA1606-2C20-421C-978B-43A7B0C21DD9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F174E30-6756-4F62-A1C4-A4D409892A62" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "7427D271-0E83-4B5F-803C-DCB6A3504D35" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0FB359DE-B6BC-4E7F-85FD-1A034565AC45" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "51742984-DC6B-4501-923C-10DB5EAEEB91" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.02:*:*:*:*:*:*:*", "matchCriteriaId": "FF7F8B1B-3F92-4CCE-9102-0EAF8E60A1E3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.03:*:*:*:*:*:*:*", "matchCriteriaId": "8A846A19-E22C-4DB1-942E-7AE0F725163B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "21FF9580-C032-474C-9A61-606BF65AD57F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.24:*:*:*:*:*:*:*", "matchCriteriaId": "63E458AA-4D75-4244-9C11-FEC58F906724" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "BD52F83D-936D-4E07-97EF-4A54BD220FB5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "D87135DA-CB8B-446A-AFF2-DC4F397B46D6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.60:*:*:*:*:*:*:*", "matchCriteriaId": "3A7C99B8-4040-4D38-B2FA-EAC2FCFD6E2F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.70:*:*:*:*:*:*:*", "matchCriteriaId": "27011F11-454F-4341-80F9-DFB6CB0A35CD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.72:*:*:*:*:*:*:*", "matchCriteriaId": "51F052CF-4B88-43BB-8D27-8C230C82F8A9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.82:*:*:*:*:*:*:*", "matchCriteriaId": "1CE3F312-776C-489A-BAA1-A9B0F2D7EE77" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.83:*:*:*:*:*:*:*", "matchCriteriaId": "834CA462-A3A9-4386-B9B0-DC30E6BB8723" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.85:*:*:*:*:*:*:*", "matchCriteriaId": "68003E26-4B5C-4F99-AA1D-4DB5EC317FDF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.86:*:*:*:*:*:*:*", "matchCriteriaId": "422F109F-8E69-4251-8C79-E0DD4DA7DD5D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.706:*:*:*:*:*:*:*", "matchCriteriaId": "58AEC9D0-C4B9-45C5-A290-C2CA760691EE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.835:*:*:*:*:*:*:*", "matchCriteriaId": "7B0AD8CF-3162-4517-959A-9FF2EEBCB53D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.861:*:*:*:*:*:*:*", "matchCriteriaId": "3DA9A959-2E9F-45FD-9C1A-D16E31074ED3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5707DC3B-2DB8-456A-95B4-D80BFFEA320E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9CA12E92-2AC3-4F7E-BAF7-D92AF88A84CA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C04AC89-8ABB-46BA-84CE-B2DDFC6294D8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C94759C-5E4D-464F-9750-82E580740B60" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "790674EF-8E04-439F-BD20-463E25081AD2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "41683325-DE0B-4D22-8AF0-1A48D3CB651A" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/34513", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/34288", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ] }, { "url": "http://www.xlightftpd.com/forum/viewtopic.php?t=1042", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.xlightftpd.com/whatsnew.htm", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49495", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/34513", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/34288", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ] }, { "url": "http://www.xlightftpd.com/forum/viewtopic.php?t=1042", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://www.xlightftpd.com/whatsnew.htm", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49495", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }