6.5
CVE-2012-2171
- EPSS 0.98%
- Published 22.06.2012 10:24:06
- Last modified 11.04.2025 00:51:21
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
SQL injection vulnerability in ModuleServlet.do in the Storage Manager Profiler in IBM System Storage DS Storage Manager before 10.83.xx.18 on DS Series devices allows remote authenticated users to execute arbitrary SQL commands via the selectedModuleOnly parameter in a state_viewmodulelog action to the ModuleServlet URI.
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ Ds Storage Manager Host Software Version <= 10.83
Ibm ≫ Ds Storage Manager Host Software Version10.8
Ibm ≫ Ds Storage Manager Host Software Version10.60.x5.14
Ibm ≫ System Storage Dcs3700 Storage Subsystem Version1818
Ibm ≫ System Storage Ds3200 Version1726
Ibm ≫ System Storage Ds3300 Version1726
Ibm ≫ System Storage Ds3400 Version1726
Ibm ≫ System Storage Ds3512 Version1746
Ibm ≫ System Storage Ds3524 Version1746
Ibm ≫ System Storage Ds3950 Express Version1814
Ibm ≫ System Storage Ds5020 Disk Controller Version1814-20a
Ibm ≫ System Storage Ds5100 Storage Controller Version1818
Ibm ≫ System Storage Ds5300 Storage Controller Version1818
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.98% | 0.746 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.