Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:vanillaforums:vanilla:*:*:*:*:*:*:*:*", "matchCriteriaId": "90C021CD-A177-4654-B621-F36CACC4ABF9", "versionEndIncluding": "2.0.18.7", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE1BDD28-B3D5-4CEF-B718-AEDB1BB85478", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "13A31A31-3D82-47B5-9FAE-4FCAD23E9FCA", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "41C2DCAF-E514-473F-BA2F-0EEE9AE634D7", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A5F1392F-711D-4C0E-94C7-4467E50E9212", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "69041BD4-FE5A-4B02-BD1B-CEFA9604FE57", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C77AE762-2955-447D-826B-D5DC2F62BE7C", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D7365AC0-3C35-43D4-AC8E-F64EEC0061F1", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "49E55ABC-15E7-4002-9BE4-CF1F1A5EFB17", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4AF565C5-1A0E-4C19-9354-FFBFA454B457", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "3B31A038-7B6A-43EB-B525-EF9CBB5F81C7", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "57E4F91A-ED9A-4B98-80FF-6621237C285C", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "0F3E2758-F9D3-46C5-9D32-FF284B91DA92", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "27D49ACC-7D32-422F-916A-8B37512CA0FB", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "2F2BCC4D-DA3D-4EFE-A607-D03FCC7491E5", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "FC6FAD04-0DF7-4D32-8604-52A5C6C4C15E", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "EF88B68F-D781-41D3-92DD-672C432BA763", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "04C9B20F-E0E0-4A67-BF20-651655B88AAD", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "158E0328-3C61-4C95-B197-DE813DD0F810", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "585F5145-1342-4EAD-A9F9-065A9694D227", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "42800B41-380A-462A-8B21-9E014910D680", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "DB2B4009-09C3-49DD-AC10-D0D8F1CBE91A", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.4:*:*:*:*:*:*:*", "matchCriteriaId": "229FB439-E8BD-411B-B3B9-EF8A7EF20947", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.5:*:*:*:*:*:*:*", "matchCriteriaId": "1C979A25-6BFF-4269-AE58-30363A45735F", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.6:*:*:*:*:*:*:*", "matchCriteriaId": "E6A9B704-61C1-4E6C-A3A1-9149E2A80B61", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.7:*:*:*:*:*:*:*", "matchCriteriaId": "03EF7909-A01B-430D-903E-225E0A7335FA", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.8:*:*:*:*:*:*:*", "matchCriteriaId": "9D0ECC55-B2E5-433D-AA95-0E901B6D0343", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.9:*:*:*:*:*:*:*", "matchCriteriaId": "3A800CA9-F408-45EA-8D11-F24F23E457D2", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9D65A488-2B65-42B9-B610-19AA705351AC", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "ED6C8E5D-1085-4D1F-820F-73A0F1D66481", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:alpha3:*:*:*:*:*:*", "matchCriteriaId": "E1E17588-DD2D-453D-BAC2-FB468D3CBDB1", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:beta1:*:*:*:*:*:*", "matchCriteriaId": "7ECCCE34-CC7F-4B2D-9A6B-9FBC37F572A6", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:beta2:*:*:*:*:*:*", "matchCriteriaId": "CE042198-0481-489B-A8EA-545367169659", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:beta4:*:*:*:*:*:*", "matchCriteriaId": "D521F90F-0F93-4E64-B43A-B4188532BE33", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "59936633-D176-4F25-B349-87F461C00B82", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "355C6F2A-88FB-44CF-82E3-AEF60F9CA8AC", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18:rc3:*:*:*:*:*:*", "matchCriteriaId": "0B1AFB55-42FF-40EF-8BEB-11CDE65FBDDC", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "94086F8C-5F24-4D95-9B20-10719C562ABF", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18.3:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBE95A-1EF7-44F6-B94F-FD01E48CEF3C", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6B3F737-B681-4EA4-8EFA-96C5AA855A62", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18.5:*:*:*:*:*:*:*", "matchCriteriaId": "51A30B2C-0C0A-49C8-ABAB-FD192C298018", "vulnerable": true}, {"criteria": "cpe:2.3:a:vanillaforums:vanilla:2.0.18.6:*:*:*:*:*:*:*", "matchCriteriaId": "D7FC9FEC-2B38-4808-9A72-57AAFA4B09CE", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Multiple SQL injection vulnerabilities in Vanilla Forums before 2.0.18.8 allow remote attackers to execute arbitrary SQL commands via the parameter name in the Form/Email array to (1) entry/signin or (2) entry/passwordrequest."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Vanilla Forums versiones anteriores a v2.0.18.8 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante el par\u00e1metro \"name\" en la matriz Form/Email de (1) entrar/identificarse o (2) entrar/petici\u00f3n de contrase\u00f1a."}], "id": "CVE-2013-3527", "lastModified": "2024-11-21T01:53:49.343", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-05-10T21:55:02.500", "references": [{"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0068.html"}, {"source": "cve@mitre.org", "url": "http://mfs-enterprise.com/wordpress/2013/04/05/vanilla-forums-2-0-18-sql-injection-insert-arbitrary-user-dump-usertable/"}, {"source": "cve@mitre.org", "url": "http://osvdb.org/92109"}, {"source": "cve@mitre.org", "url": "http://osvdb.org/92110"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://seclists.org/fulldisclosure/2013/Apr/57"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/52825"}, {"source": "cve@mitre.org", "url": "http://vanillaforums.org/discussion/23339/security-update-vanilla-2-0-18-7"}, {"source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/24927"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/58922"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83289"}, {"source": "cve@mitre.org", "url": "https://github.com/vanillaforums/Garden/commit/83078591bc4d263e77d2a2ca283100997755290d"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0068.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mfs-enterprise.com/wordpress/2013/04/05/vanilla-forums-2-0-18-sql-injection-insert-arbitrary-user-dump-usertable/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/92109"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/92110"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://seclists.org/fulldisclosure/2013/Apr/57"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/52825"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://vanillaforums.org/discussion/23339/security-update-vanilla-2-0-18-7"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/24927"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/58922"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83289"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/vanillaforums/Garden/commit/83078591bc4d263e77d2a2ca283100997755290d"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-89"}], "source": "nvd@nist.gov", "type": "Primary"}]}