René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

255 lines
10 KiB
JSON

{
"id": "CVE-2009-4791",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-04-22T14:30:00.463",
"lastModified": "2018-10-10T19:49:29.277",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in Family Connections (aka FCMS) before 1.8.2 allow remote attackers to execute arbitrary SQL commands via the (1) letter parameter to addressbook.php, (2) id parameter to recipes.php, (3) year parameter to register.php, (4) poll_id parameter to home.php, and (5) email parameter to lostpw.php."
},
{
"lang": "es",
"value": "Multiples vulnerabilidades de inyecci\u00f3n SQL en Family Connections (FCMS) en versiones anteriores a la v1.8.2 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros (1) letter de addressbook.php, (2) id de recipes.php, (3) year de register.php, (4) poll_id de home.php, y (5) email de lostpw.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.8.1",
"matchCriteriaId": "4AAA6B57-E936-471B-86B8-B10B735614A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BA509908-BAAB-4FEE-BFCF-66F972284D9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "24B23881-2C8D-405F-9707-7064CAF2076F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF1AE86-FE99-43CA-988A-78CAD57F26DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5D165CCF-BF8B-4BD8-B1D3-6FA671012555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5729DE6B-8DE4-461A-8E02-F22C56DE6408"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "212070C7-B670-44EA-9F81-D67F605E944B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C78C3E6D-6D8C-4C7F-A977-7E5966AE2386"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3F85CDEA-DF6E-4B1B-9AF6-9B42228684B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A769ACB2-0A8D-4F6D-858B-D38BC53D00A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE7B2DA-20D3-44A4-B34C-9B134A2EB492"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:0.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "52B31824-E432-4732-9041-C633F53E994B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A523F1EA-6AF4-465A-BED6-1F8C7D001D56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A70F3155-0155-45BE-8D35-C13C012E434C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "092B8C26-6628-4910-88C7-903536828F6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AE73C91C-C2DC-499F-B64B-CFA6D0ACF5D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AC06DCA4-36C8-43EA-BE4D-665857C0A58B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "09AF2E34-3ACC-4712-8CFC-B215793BB1D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "48BEBA87-8685-4E5B-9A10-ED658BACD020"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "423E786D-1619-4292-BC5E-0B0EE535C3E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1D658A6A-35FE-44FF-9148-DFBA453D0006"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "150284F5-FB0D-4E09-BEE9-11D037C2C2F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4EDE49A-40DF-4CAA-8E0A-9D4E88DE67B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8B688361-A6A1-41AE-88C1-FD244FCC1E20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0E4BD989-7EC2-4B0E-B728-BBE13731B5D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3783EA4C-A416-4E68-8C3E-B18CA71359FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C42088E-ECC8-4BD1-B6CA-9B04896996EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "25107E51-AC63-4E52-972D-5ED8D23863F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0D15350F-0283-4CE0-89B9-F8642FE666C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E76D58EA-FC16-4B2F-9AC5-14431316D0DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD529C5-38D3-43FC-8233-67EF3577AE3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ryan_haudenschilt:family_connections:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1027CE9C-C048-4735-A3D4-2C329AD64131"
}
]
}
]
}
],
"references": [
{
"url": "http://sourceforge.net/project/shownotes.php?release_id=672266",
"source": "cve@mitre.org"
},
{
"url": "http://www.exploit-db.com/exploits/8319",
"source": "cve@mitre.org"
},
{
"url": "http://www.familycms.com/blog/2009/03/fcms-182-released/",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/502272/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/34297",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
}
]
}