Multiple SQL injection vulnerabilities in zport/dmd/Events/getJSONEventsInfo in Zenoss 2.3.3, and other versions before 2.5, allow remote authenticated users to execute arbitrary SQL commands via the (1) severity, (2) state, (3) filter, (4) offset, and (5) count parameters.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev.zenoss.org/trac/changeset/15257 - Vendor Advisory | |
References | () http://osvdb.org/61804 - | |
References | () http://secunia.com/advisories/38195 - Vendor Advisory | |
References | () http://www.ngenuity.org/wordpress/2010/01/14/ngenuity-2010-001-zenoss-getjsoneventsinfo-sql-injection/ - | |
References | () http://www.securityfocus.com/bid/37802 - Exploit | |
References | () http://www.zenoss.com/news/SQL-Injection-and-Cross-Site-Forgery-in-Zenoss-Core-Corrected.html - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/55670 - |
Information
Published : 2010-02-26 17:30
Updated : 2024-11-21 01:12
NVD link : CVE-2010-0712
Mitre link : CVE-2010-0712
CVE.ORG link : CVE-2010-0712
JSON object : View
Products Affected
zenoss
- zenoss
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')