SQL injection vulnerability in the radius_xlat function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote authenticated users to execute arbitrary SQL commands via (1) group_membership_query, (2) simul_count_query, or (3) simul_verify_query configuration entries.
References
Configurations
History
20 Nov 2024, 23:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-05/0492.html - | |
References | () http://www.freeradius.org/security.html - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200505-13.xml - Patch | |
References | () http://www.novell.com/linux/security/advisories/2005_14_sr.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2005-524.html - | |
References | () http://www.securityfocus.com/bid/13540 - Patch | |
References | () http://www.securitytracker.com/alerts/2005/May/1013909.html - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/20449 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9610 - |
Information
Published : 2005-05-19 04:00
Updated : 2024-11-20 23:57
NVD link : CVE-2005-1454
Mitre link : CVE-2005-1454
CVE.ORG link : CVE-2005-1454
JSON object : View
Products Affected
freeradius
- freeradius
CWE