2024-12-08 03:06:42 +00:00

142 lines
4.0 KiB
JSON

{
"id": "CVE-2006-3318",
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"published": "2006-06-29T21:05:00.000",
"lastModified": "2024-11-21T00:13:21.037",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in register.php for phpRaid 3.0.6 and possibly other versions, when the authorization type is phpraid, allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) email parameters."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en register.php de phpRaid v3.0.6 y probablemente otras versiones, cuando el tipo autorizaci\u00f3n es \"phpraid\", permite a atacantes remotos ejecutar comandos SQL a su elecci\u00f3n a trav\u00e9s del par\u00e1metro (1)raid_id y (2) email."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"baseScore": 5.1,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:spiffyjr:phpraid:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C2080E07-A725-49A9-AECE-AA3FE5F94867"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/20865",
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-47/advisory/",
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/1173",
"source": "PSIRT-CNA@flexerasoftware.com"
},
{
"url": "http://www.securityfocus.com/archive/1/438706/100/0/threaded",
"source": "PSIRT-CNA@flexerasoftware.com"
},
{
"url": "http://www.vupen.com/english/advisories/2006/2593",
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27459",
"source": "PSIRT-CNA@flexerasoftware.com"
},
{
"url": "http://secunia.com/advisories/20865",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-47/advisory/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/1173",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/438706/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2006/2593",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27459",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}