SQL injection vulnerability in www/delivery/axmlrpc.php (aka the XML-RPC delivery invocation script) in Revive Adserver before 3.0.2, and OpenX Source 2.8.11 and earlier, allows remote attackers to execute arbitrary SQL commands via the what parameter to an XML-RPC method.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kreativrauschen.com/blog/2013/12/18/zero-day-vulnerability-in-openx-source-2-8-11-and-revive-adserver-3-0-1/ - | |
References | () http://www.revive-adserver.com/security/REVIVE-SA-2013-001/ - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/530471/30/0/threaded - |
Information
Published : 2013-12-28 04:53
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7149
Mitre link : CVE-2013-7149
CVE.ORG link : CVE-2013-7149
JSON object : View
Products Affected
revive-adserver
- revive_adserver
openx
- openx
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')