Multiple SQL injection vulnerabilities in Open Business Management (OBM) 2.4.0-rc13 and probably earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) sel_domain_id or (2) action parameter to obm.php; (3) tf_user parameter in a search action to group/group_index.php; (4) tf_delegation, (5) tf_ip, (6) tf_name to host/host_index.php; or (7) lang, (8) theme, (9) cal_alert, (10) cal_first_hour, (11) cal_interval, (12) cal_last_hour, (13) commentorder, (14) csv_sep, (15) date, (16) date_upd, (17) debug_exe, (18) debug_id, (19) debug_param, (20) debug_sess, (21) debug_solr, (22) debug_sql, (23) dsrc, (24) menu, (25) rows, (26) sel_display_days, (27) timeformat, (28) timezone, or (29) todo parameter to settings/settings_index.php.
References
Configurations
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/78004 - | |
References | () http://osvdb.org/78005 - | |
References | () http://osvdb.org/78006 - | |
References | () http://secunia.com/advisories/47139 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/71922 - | |
References | () https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_obm.html - Exploit |
Information
Published : 2012-08-31 21:55
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5145
Mitre link : CVE-2011-5145
CVE.ORG link : CVE-2011-5145
JSON object : View
Products Affected
obm
- open_business_management
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')