The Quick Search API in CiviCRM 4.2.0 through 4.2.9 and 4.3.0 through 4.3.3 allows remote authenticated users to bypass the validation layer and conduct SQL injection attacks via a direct request to the "second layer" of the API, related to contact.getquick.
References
Link | Resource |
---|---|
http://issues.civicrm.org/jira/browse/CRM-12765 | Vendor Advisory |
https://civicrm.org/advisory/civi-sa-2013-004-limited-sql-injection-quick-search-api | Vendor Advisory |
http://issues.civicrm.org/jira/browse/CRM-12765 | Vendor Advisory |
https://civicrm.org/advisory/civi-sa-2013-004-limited-sql-injection-quick-search-api | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://issues.civicrm.org/jira/browse/CRM-12765 - Vendor Advisory | |
References | () https://civicrm.org/advisory/civi-sa-2013-004-limited-sql-injection-quick-search-api - Vendor Advisory |
Information
Published : 2014-01-29 18:55
Updated : 2024-11-21 01:56
NVD link : CVE-2013-4662
Mitre link : CVE-2013-4662
CVE.ORG link : CVE-2013-4662
JSON object : View
Products Affected
civicrm
- civicrm
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')