mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
189 lines
6.3 KiB
JSON
189 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2009-1208",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-04-01T10:30:00.360",
|
|
"lastModified": "2017-08-17T01:30:13.880",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "SQL injection vulnerability in auth2db 0.2.5, and possibly other versions before 0.2.7, uses the addslashes function instead of the mysql_real_escape_string function, which allows remote attackers to conduct SQL injection attacks using multibyte character encodings."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de inyecci\u00f3n SQL en auth2db v0.2.5 y posiblemente otras versiones anteriores a la v0.2.7, emplea la funci\u00f3n addslashes en vez de mysql_real_escape_string, lo que permite a atacantes remotos llevar a cabo ataques de inyecci\u00f3n SQL usando codificaciones de caracteres multibyte."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7ADBE959-5BD2-4F1C-B661-B7CFFFB7AA52"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D75A90F6-62CF-41C3-A8ED-D9B1F2B0E8DA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C892EC6A-A4BB-4985-AD36-1B3109649130"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F874A8E-890E-43E3-A2B1-6405541D9960"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44B108BC-10AE-486A-A609-2E96DB094557"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "96EE7BE6-882D-4B2A-AB7B-4C3C9F79A836"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8B5F172-9E20-49E8-A337-85C46F85CBDB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.1.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "576B8177-220D-4D9B-A7B9-F6972751D0D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.1.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "743F3844-D07B-4031-BC79-9723FB1EE7C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9364AFFB-1718-4C7B-A2F0-826883E53D54"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "67ACADB2-A81D-4617-9039-6DD7C5DC4B41"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06E6DEC0-36A5-4A4B-BD55-11538713EA87"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EFCB393B-EFAD-4C01-B43B-738E73B5842F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85462ABB-BCBB-4528-962A-FB4CF44D961A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "70D14ACC-ECEE-4CB7-B7E8-D4565DD46D38"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2db:auth2db:0.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A1842BC-FF1E-4AEC-8B48-B15FF888CAFA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:auth2dbauth2db:0.1.1:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50EB40E3-1A47-4A0E-BF48-E33D0D64F49B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521823",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/34488",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.auth2db.com.ar/?title=CHANGELOG",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2009/dsa-1757",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/34287",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49518",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |