Vulnerabilites related to 3ds - push2rss_3ds
Vulnerability from fkie_nvd
Published
2013-06-27 20:55
Modified
2024-11-21 01:56
Severity ?
Summary
SQL injection vulnerability in the RSS feed from records extension 1.0.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
3ds | push2rss_3ds | * | |
typo3 | typo3 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:3ds:push2rss_3ds:*:*:*:*:*:*:*:*", matchCriteriaId: "7BC137ED-BF22-47CE-A0A2-1AED321E4409", versionEndIncluding: "1.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:typo3:typo3:-:*:*:*:*:*:*:*", matchCriteriaId: "E66C5ABA-7727-4562-A792-5E450098D520", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection vulnerability in the RSS feed from records extension 1.0.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.", }, { lang: "es", value: "Vulnerabilidad de inyección SQL en el feed RSS de extensión de los registros v1.0.0 y versiones anteriores para TYPO3 permite a atacantes remotos ejecutar comandos SQL de su elección a través de vectores no especificados.", }, ], id: "CVE-2013-4721", lastModified: "2024-11-21T01:56:08.380", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2013-06-27T20:55:01.873", references: [ { source: "cve@mitre.org", url: "http://osvdb.org/90411", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/82218", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/90411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/82218", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2013-4721
Vulnerability from cvelistv5
Published
2013-06-27 20:00
Modified
2024-08-06 16:52
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in the RSS feed from records extension 1.0.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/82218 | vdb-entry, x_refsource_XF | |
http://osvdb.org/90411 | vdb-entry, x_refsource_OSVDB | |
http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T16:52:27.320Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "typo3-rssfeed-unspecified-sql-injection(82218)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/82218", }, { name: "90411", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/90411", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2013-02-19T00:00:00", descriptions: [ { lang: "en", value: "SQL injection vulnerability in the RSS feed from records extension 1.0.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-28T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "typo3-rssfeed-unspecified-sql-injection(82218)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/82218", }, { name: "90411", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/90411", }, { tags: [ "x_refsource_MISC", ], url: "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2013-4721", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "SQL injection vulnerability in the RSS feed from records extension 1.0.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "typo3-rssfeed-unspecified-sql-injection(82218)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/82218", }, { name: "90411", refsource: "OSVDB", url: "http://osvdb.org/90411", }, { name: "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/", refsource: "MISC", url: "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2013-4721", datePublished: "2013-06-27T20:00:00", dateReserved: "2013-06-27T00:00:00", dateUpdated: "2024-08-06T16:52:27.320Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }