CVE-2008-6992

GreenSQL Firewall (greensql-fw), possibly before 0.9.2 or 0.9.4, allows remote attackers to bypass the SQL injection protection mechanism via a WHERE clause containing an expression such as "x=y=z", which is successfully parsed by MySQL.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:greensql:greensql_firewall:*:*:*:*:*:*:*:*
cpe:2.3:a:greensql:greensql_firewall:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:greensql:greensql_firewall:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:greensql:greensql_firewall:0.8.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:58

Type Values Removed Values Added
References () http://bugs.mysql.com/bug.php?id=39337 - Exploit () http://bugs.mysql.com/bug.php?id=39337 - Exploit
References () http://osvdb.org/48910 - Exploit () http://osvdb.org/48910 - Exploit
References () http://sla.ckers.org/forum/read.php?16%2C24367 - () http://sla.ckers.org/forum/read.php?16%2C24367 -
References () http://www.greensql.net/node/89 - Patch () http://www.greensql.net/node/89 - Patch
References () http://www.greensql.net/node/98 - Patch () http://www.greensql.net/node/98 - Patch
References () http://www.greensql.net/security - Vendor Advisory () http://www.greensql.net/security - Vendor Advisory

07 Nov 2023, 02:03

Type Values Removed Values Added
References
  • {'url': 'http://sla.ckers.org/forum/read.php?16,24367', 'name': 'http://sla.ckers.org/forum/read.php?16,24367', 'tags': [], 'refsource': 'MISC'}
  • () http://sla.ckers.org/forum/read.php?16%2C24367 -

Information

Published : 2009-08-19 05:24

Updated : 2024-11-21 00:58


NVD link : CVE-2008-6992

Mitre link : CVE-2008-6992

CVE.ORG link : CVE-2008-6992


JSON object : View

Products Affected

greensql

  • greensql_firewall
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')