Vulnerability CVE-2014-5387


Published: 2014-11-04

Description:
Multiple SQL injection vulnerabilities in EllisLab ExpressionEngine before 2.9.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
EllisLab ExpressionEngine Core SQL Injection
MailMarshal
04.11.2014

Type:

CWE-89

(Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'))

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Ellislab -> Expressionengine 

 References:
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5387
https://ellislab.com/expressionengine/user-guide/about/changelog.html
http://www.securityfocus.com/bid/70875
http://seclists.org/fulldisclosure/2014/Nov/2
http://packetstormsecurity.com/files/128946/EllisLab-ExpressionEngine-Core-SQL-Injection.html

Copyright 2024, cxsecurity.com

 

Back to Top