CVE-2009-1812

Multiple SQL injection vulnerabilities in myGesuad 0.9.14 (aka 0.9) allow remote attackers to execute arbitrary SQL commands via (1) the formUser parameter (aka the Name field) to common/login.php, and allow remote authenticated users to execute arbitrary SQL commands via the ID parameter in a Detail action to (2) kategorie.php, (3) budget.php, (4) zahlung.php, or (5) adresse.php in modules/, related to classes/class.perform.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:collector:mygesuad:0.9.14:*:*:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://secunia.com/advisories/35110 - Vendor Advisory () http://secunia.com/advisories/35110 - Vendor Advisory
References () http://www.collector.ch/drupal5/?q=node/39 - Patch, Vendor Advisory () http://www.collector.ch/drupal5/?q=node/39 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/34998 - Exploit () http://www.securityfocus.com/bid/34998 - Exploit
References () http://www.vupen.com/english/advisories/2009/1345 - () http://www.vupen.com/english/advisories/2009/1345 -
References () https://www.exploit-db.com/exploits/8708 - () https://www.exploit-db.com/exploits/8708 -

Information

Published : 2009-05-29 16:30

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1812

Mitre link : CVE-2009-1812

CVE.ORG link : CVE-2009-1812


JSON object : View

Products Affected

collector

  • mygesuad
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')