SQL injection vulnerability in the password reset page in Open Web Analytics (OWA) before 1.5.5 allows remote attackers to execute arbitrary SQL commands via the owa_email_address parameter in a base.passwordResetRequest action to index.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/56350 - Vendor Advisory | |
References | () http://wiki.openwebanalytics.com/index.php?title=1.5.5 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/31738 - | |
References | () http://www.secureworks.com/advisories/SWRX-2014-001/SWRX-2014-001.pdf - Exploit | |
References | () http://www.securityfocus.com/archive/1/531105/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/64774 - Exploit |
Information
Published : 2014-01-15 16:08
Updated : 2024-11-21 02:03
NVD link : CVE-2014-1206
Mitre link : CVE-2014-1206
CVE.ORG link : CVE-2014-1206
JSON object : View
Products Affected
openwebanalytics
- open_web_analytics
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')