CVE-2013-3527

Multiple SQL injection vulnerabilities in Vanilla Forums before 2.0.18.8 allow remote attackers to execute arbitrary SQL commands via the parameter name in the Form/Email array to (1) entry/signin or (2) entry/passwordrequest.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2013-04/0068.html Exploit
http://mfs-enterprise.com/wordpress/2013/04/05/vanilla-forums-2-0-18-sql-injection-insert-arbitrary-user-dump-usertable/
http://osvdb.org/92109
http://osvdb.org/92110
http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html Exploit
http://seclists.org/fulldisclosure/2013/Apr/57 Exploit
http://secunia.com/advisories/52825 Vendor Advisory
http://vanillaforums.org/discussion/23339/security-update-vanilla-2-0-18-7
http://www.exploit-db.com/exploits/24927
http://www.securityfocus.com/bid/58922 Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/83289
https://github.com/vanillaforums/Garden/commit/83078591bc4d263e77d2a2ca283100997755290d
http://archives.neohapsis.com/archives/bugtraq/2013-04/0068.html Exploit
http://mfs-enterprise.com/wordpress/2013/04/05/vanilla-forums-2-0-18-sql-injection-insert-arbitrary-user-dump-usertable/
http://osvdb.org/92109
http://osvdb.org/92110
http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html Exploit
http://seclists.org/fulldisclosure/2013/Apr/57 Exploit
http://secunia.com/advisories/52825 Vendor Advisory
http://vanillaforums.org/discussion/23339/security-update-vanilla-2-0-18-7
http://www.exploit-db.com/exploits/24927
http://www.securityfocus.com/bid/58922 Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/83289
https://github.com/vanillaforums/Garden/commit/83078591bc4d263e77d2a2ca283100997755290d
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vanillaforums:vanilla:*:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.16:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.16.1:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17.1:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17.2:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17.3:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17.4:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17.5:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17.6:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17.7:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17.8:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17.9:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.17.10:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18:alpha3:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18:beta1:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18:beta2:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18:beta4:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18:rc1:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18:rc2:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18:rc3:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18.1:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18.3:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18.4:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18.5:*:*:*:*:*:*:*
cpe:2.3:a:vanillaforums:vanilla:2.0.18.6:*:*:*:*:*:*:*

History

21 Nov 2024, 01:53

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2013-04/0068.html - Exploit () http://archives.neohapsis.com/archives/bugtraq/2013-04/0068.html - Exploit
References () http://mfs-enterprise.com/wordpress/2013/04/05/vanilla-forums-2-0-18-sql-injection-insert-arbitrary-user-dump-usertable/ - () http://mfs-enterprise.com/wordpress/2013/04/05/vanilla-forums-2-0-18-sql-injection-insert-arbitrary-user-dump-usertable/ -
References () http://osvdb.org/92109 - () http://osvdb.org/92109 -
References () http://osvdb.org/92110 - () http://osvdb.org/92110 -
References () http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html - Exploit () http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html - Exploit
References () http://seclists.org/fulldisclosure/2013/Apr/57 - Exploit () http://seclists.org/fulldisclosure/2013/Apr/57 - Exploit
References () http://secunia.com/advisories/52825 - Vendor Advisory () http://secunia.com/advisories/52825 - Vendor Advisory
References () http://vanillaforums.org/discussion/23339/security-update-vanilla-2-0-18-7 - () http://vanillaforums.org/discussion/23339/security-update-vanilla-2-0-18-7 -
References () http://www.exploit-db.com/exploits/24927 - () http://www.exploit-db.com/exploits/24927 -
References () http://www.securityfocus.com/bid/58922 - Exploit () http://www.securityfocus.com/bid/58922 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/83289 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/83289 -
References () https://github.com/vanillaforums/Garden/commit/83078591bc4d263e77d2a2ca283100997755290d - () https://github.com/vanillaforums/Garden/commit/83078591bc4d263e77d2a2ca283100997755290d -

Information

Published : 2013-05-10 21:55

Updated : 2024-11-21 01:53


NVD link : CVE-2013-3527

Mitre link : CVE-2013-3527

CVE.ORG link : CVE-2013-3527


JSON object : View

Products Affected

vanillaforums

  • vanilla
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')