FKIE_CVE-2013-3527
Vulnerability from fkie_nvd - Published: 2013-05-10 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple SQL injection vulnerabilities in Vanilla Forums before 2.0.18.8 allow remote attackers to execute arbitrary SQL commands via the parameter name in the Form/Email array to (1) entry/signin or (2) entry/passwordrequest.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90C021CD-A177-4654-B621-F36CACC4ABF9",
"versionEndIncluding": "2.0.18.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DE1BDD28-B3D5-4CEF-B718-AEDB1BB85478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "13A31A31-3D82-47B5-9FAE-4FCAD23E9FCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "41C2DCAF-E514-473F-BA2F-0EEE9AE634D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F1392F-711D-4C0E-94C7-4467E50E9212",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "69041BD4-FE5A-4B02-BD1B-CEFA9604FE57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C77AE762-2955-447D-826B-D5DC2F62BE7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D7365AC0-3C35-43D4-AC8E-F64EEC0061F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "49E55ABC-15E7-4002-9BE4-CF1F1A5EFB17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF565C5-1A0E-4C19-9354-FFBFA454B457",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3B31A038-7B6A-43EB-B525-EF9CBB5F81C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "57E4F91A-ED9A-4B98-80FF-6621237C285C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0F3E2758-F9D3-46C5-9D32-FF284B91DA92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "27D49ACC-7D32-422F-916A-8B37512CA0FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "2F2BCC4D-DA3D-4EFE-A607-D03FCC7491E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6FAD04-0DF7-4D32-8604-52A5C6C4C15E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "EF88B68F-D781-41D3-92DD-672C432BA763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "04C9B20F-E0E0-4A67-BF20-651655B88AAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "158E0328-3C61-4C95-B197-DE813DD0F810",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "585F5145-1342-4EAD-A9F9-065A9694D227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "42800B41-380A-462A-8B21-9E014910D680",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DB2B4009-09C3-49DD-AC10-D0D8F1CBE91A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "229FB439-E8BD-411B-B3B9-EF8A7EF20947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1C979A25-6BFF-4269-AE58-30363A45735F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A9B704-61C1-4E6C-A3A1-9149E2A80B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "03EF7909-A01B-430D-903E-225E0A7335FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9D0ECC55-B2E5-433D-AA95-0E901B6D0343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.9:*:*:*:*:*:*:*",
"matchCriteriaId": "3A800CA9-F408-45EA-8D11-F24F23E457D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9D65A488-2B65-42B9-B610-19AA705351AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "ED6C8E5D-1085-4D1F-820F-73A0F1D66481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "E1E17588-DD2D-453D-BAC2-FB468D3CBDB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:beta1:*:*:*:*:*:*",
"matchCriteriaId": "7ECCCE34-CC7F-4B2D-9A6B-9FBC37F572A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:beta2:*:*:*:*:*:*",
"matchCriteriaId": "CE042198-0481-489B-A8EA-545367169659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:beta4:*:*:*:*:*:*",
"matchCriteriaId": "D521F90F-0F93-4E64-B43A-B4188532BE33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "59936633-D176-4F25-B349-87F461C00B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "355C6F2A-88FB-44CF-82E3-AEF60F9CA8AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0B1AFB55-42FF-40EF-8BEB-11CDE65FBDDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "94086F8C-5F24-4D95-9B20-10719C562ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F8BBE95A-1EF7-44F6-B94F-FD01E48CEF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B3F737-B681-4EA4-8EFA-96C5AA855A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "51A30B2C-0C0A-49C8-ABAB-FD192C298018",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FC9FEC-2B38-4808-9A72-57AAFA4B09CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in Vanilla Forums before 2.0.18.8 allow remote attackers to execute arbitrary SQL commands via the parameter name in the Form/Email array to (1) entry/signin or (2) entry/passwordrequest."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Vanilla Forums versiones anteriores a v2.0.18.8 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante el par\u00e1metro \"name\" en la matriz Form/Email de (1) entrar/identificarse o (2) entrar/petici\u00f3n de contrase\u00f1a."
}
],
"id": "CVE-2013-3527",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-05-10T21:55:02.500",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0068.html"
},
{
"source": "cve@mitre.org",
"url": "http://mfs-enterprise.com/wordpress/2013/04/05/vanilla-forums-2-0-18-sql-injection-insert-arbitrary-user-dump-usertable/"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/92109"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/92110"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://seclists.org/fulldisclosure/2013/Apr/57"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/52825"
},
{
"source": "cve@mitre.org",
"url": "http://vanillaforums.org/discussion/23339/security-update-vanilla-2-0-18-7"
},
{
"source": "cve@mitre.org",
"url": "http://www.exploit-db.com/exploits/24927"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/58922"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83289"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/vanillaforums/Garden/commit/83078591bc4d263e77d2a2ca283100997755290d"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0068.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://mfs-enterprise.com/wordpress/2013/04/05/vanilla-forums-2-0-18-sql-injection-insert-arbitrary-user-dump-usertable/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/92109"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/92110"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://seclists.org/fulldisclosure/2013/Apr/57"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/52825"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://vanillaforums.org/discussion/23339/security-update-vanilla-2-0-18-7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.exploit-db.com/exploits/24927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/58922"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/vanillaforums/Garden/commit/83078591bc4d263e77d2a2ca283100997755290d"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…