fkie_cve-2008-5320
Vulnerability from fkie_nvd
Published
2008-12-03 19:30
Modified
2024-11-21 00:53
Severity ?
Summary
SQL injection vulnerability in usersettings.php in e107 0.7.13 and earlier allows remote authenticated users to execute arbitrary SQL commands via the ue[] parameter.
Impacted products
Vendor Product Version
e107 e107 *
e107 e107 0.7
e107 e107 0.7.1
e107 e107 0.7.2
e107 e107 0.7.3
e107 e107 0.7.4
e107 e107 0.7.5
e107 e107 0.7.6
e107 e107 0.7.7
e107 e107 0.7.8
e107 e107 0.7.9
e107 e107 0.7.10
e107 e107 0.7.11
e107 e107 0.547_beta
e107 e107 0.548_beta
e107 e107 0.549_beta
e107 e107 0.551_beta
e107 e107 0.552_beta
e107 e107 0.553_beta
e107 e107 0.554_beta
e107 e107 0.555_beta
e107 e107 0.600
e107 e107 0.601
e107 e107 0.602
e107 e107 0.603
e107 e107 0.604
e107 e107 0.605
e107 e107 0.606
e107 e107 0.607
e107 e107 0.608
e107 e107 0.609
e107 e107 0.610
e107 e107 0.611
e107 e107 0.612
e107 e107 0.613
e107 e107 0.614
e107 e107 0.615
e107 e107 0.615a
e107 e107 0.616
e107 e107 0.617
e107 e107 0.6171
e107 e107 0.6172
e107 e107 0.6173
e107 e107 0.6174
e107 e107 0.6175
e107 e107 5.1
e107 e107 5.3_beta
e107 e107 5.3_beta2
e107 e107 5.04
e107 e107 5.4_beta1
e107 e107 5.4_beta3
e107 e107 5.4_beta4
e107 e107 5.4_beta5
e107 e107 5.4_beta6
e107 e107 5.05
e107 e107 5.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C676F07-E60C-405B-9200-C58A5286D818",
              "versionEndIncluding": "0.7.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AB914E-D616-45D2-A451-1C247B8B6E4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA03C1AC-97EA-47ED-9558-A7CA48420AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32695A82-B042-46B7-9CB4-20F3446E0C9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6716A040-0CBE-4402-AB2A-1621B1240B0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81627355-AB45-4D47-8DD2-4087E6971EF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DAAA4F-B893-4914-8538-E68DDA211225",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B649DDC6-EEE6-47E1-A69A-831E5C2DD58C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FEEC90E-8640-4786-B014-CAD83EC4F2E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E29B9B12-4C94-4A8D-B407-2D288502EFE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CAADA1-1FBB-4983-A942-FC4490CE8D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4D7C699-0E92-4D9C-9D8F-87C39A28ACCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C62F8AD-EA30-441E-B97F-EF8DE640DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.547_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "437C4251-886C-4E94-B7F6-AE34A0142A76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.548_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "761D4EE9-0D54-4370-BCBC-3C23481C127B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.549_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11E3F9E-708E-44CB-8FD2-E4961028B732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.551_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F38EB42-437C-4381-B36A-FD3DB78E724E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.552_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECC957BA-D96C-41B7-9BD4-2ECD37C9C924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.553_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9E9AC1-5ECD-448F-B72A-1CE8228C2C22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.554_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC4B3A4-2563-4C06-A484-5C02CD8F7408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.555_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC274184-AD8E-4BC2-BC6A-4E64F354BFFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E80F85C-61AD-49C0-9EBF-B79F728F6A97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FE097FC-A525-4599-9FDA-1A011EECE767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FF51B0D-E020-491D-92A9-D2A01A7417AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8692341-8DF2-4943-853A-4AAF1F313914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:*",
              "matchCriteriaId": "75197306-53DB-4C94-959B-C46D3FB1F42B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C5C91C-C1C5-457D-9E09-24C7CACCC280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EB88C92-4F62-471A-8C10-C13C890E764F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:*",
              "matchCriteriaId": "5585DC36-C65F-4FCA-B26F-E4A7901863E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7DD56C-66F7-421C-B211-07C7856112C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E14B108-228D-454F-AF16-9D9086E4C10B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:*",
              "matchCriteriaId": "04C91C45-9A96-4E69-8A0A-D619AB45BC08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7C68F4-9ECD-41A9-B4AE-48F028841428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B75E28-08DE-4CA2-A60B-FB2F61AEC5BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9AA824A-CEE6-460B-A668-92FC3A822305",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A51FBB3-42CE-40E1-A15D-ADDFBF8E203D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEAC1FD5-ECD1-480C-827E-F1AE8484C4EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D17F613A-6BE1-4B45-8E40-8E44E0EEA756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB33E9-9AB8-482A-A196-768A2085A49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:*",
              "matchCriteriaId": "12BD5CAD-0EB8-48F2-AF80-510584A83446",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8CD2A8-C8E8-4A5F-8355-6DF45C9DF45C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:*",
              "matchCriteriaId": "92E294FE-F0A2-45FC-BB67-D988DD89D2AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:*",
              "matchCriteriaId": "9640315B-7F04-4F5A-B213-8FAF509DFF01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA89549A-6CD7-4DDB-A8C8-ADF103F6CDFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF75A192-81C1-4F58-A660-7EFE4F33E58B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4189588A-A887-4D27-B3A0-48A3DBBD5E67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.3_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA26A71E-F1E6-4EA0-9165-F7989FB89B15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.3_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C90BAB9-2ACE-48E4-BC15-E88C2C370B15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFD219A3-4958-4EA9-A914-37D4F0A8A24D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.4_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3417C70B-E531-49C8-971E-CC349FB5AA1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.4_beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5EF2F8-0A65-4C8C-A4A3-9B9B1151509C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.4_beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FBE3F6-7685-43BA-B63B-28AA79330323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.4_beta5:*:*:*:*:*:*:*",
              "matchCriteriaId": "94CC3B56-F1FC-452A-A0A7-4CF60089C1E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.4_beta6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7524B12E-3D05-4CD1-B582-8A66EEC3F6DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "590FE150-07AF-4E25-B8F8-D0E8500D73B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:e107:e107:5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "F515DEBF-B55A-4B42-8E1F-AB9A2C3DD8DF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in usersettings.php in e107 0.7.13 and earlier allows remote authenticated users to execute arbitrary SQL commands via the ue[] parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en el archivo usersettings.php en e107 0.7.13 y versiones anteriores, permite a los usuarios remotos autentificados ejecutar arbitrariamente comandos SQL a trav\u00e9s del par\u00e1metro ue[]."
    }
  ],
  "id": "CVE-2008-5320",
  "lastModified": "2024-11-21T00:53:49.330",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-12-03T19:30:00.393",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32322"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/4683"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31821"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2860"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45967"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/6791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32322"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4683"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45967"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/6791"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.