6
CVE-2008-4904
- EPSS 0.36%
- Veröffentlicht 04.11.2008 00:58:40
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
SQL injection vulnerability in the "Manage pages" feature (admin/pages) in Typo 5.1.3 and earlier allows remote authenticated users with "blog publisher" rights to execute arbitrary SQL commands via the search[published_at] parameter.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Typosphere ≫ Typo Version <= 5.1.3
Typosphere ≫ Typo Version1.6
Typosphere ≫ Typo Version1.6.8
Typosphere ≫ Typo Version2.0.0
Typosphere ≫ Typo Version2.0.1
Typosphere ≫ Typo Version2.0.5
Typosphere ≫ Typo Version2.0.6
Typosphere ≫ Typo Version2.5.0
Typosphere ≫ Typo Version2.5.1
Typosphere ≫ Typo Version2.5.2
Typosphere ≫ Typo Version2.5.3
Typosphere ≫ Typo Version2.5.4
Typosphere ≫ Typo Version2.5.5
Typosphere ≫ Typo Version2.5.6
Typosphere ≫ Typo Version2.5.7
Typosphere ≫ Typo Version2.5.8
Typosphere ≫ Typo Version2.6.0
Typosphere ≫ Typo Version3.99.0
Typosphere ≫ Typo Version3.99.1
Typosphere ≫ Typo Version3.99.2
Typosphere ≫ Typo Version3.99.3
Typosphere ≫ Typo Version3.99.4
Typosphere ≫ Typo Version4.0.0
Typosphere ≫ Typo Version4.1.1
Typosphere ≫ Typo Version5.0.2
Typosphere ≫ Typo Version5.0.3
Typosphere ≫ Typo Version5.0.3.98
Typosphere ≫ Typo Version5.0.3.98.1
Typosphere ≫ Typo Version5.1
Typosphere ≫ Typo Version5.1.1
Typosphere ≫ Typo Version5.1.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.36% | 0.555 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6 | 6.8 | 6.4 |
AV:N/AC:M/Au:S/C:P/I:P/A:P
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.