CVE-2005-2113
Published Jul 5, 2005
Last updated 8 years ago
Overview
- Description
- SQL injection vulnerability in the loginUser function in the XMLRPC server in XOOPS 2.0.11 and earlier allows remote attackers to execute arbitrary SQL commands and bypass authentication via crafted values in an XML file, as demonstrated using the blogger.getPost method.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:xoops:xoops:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D649637-9772-4B71-B219-DD505CDB3549" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33E91D0D-42F6-4FAC-BD04-AA4D77C6DAD3" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "881DDA3C-4D95-471F-95BA-6C4629B3CB68" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E235D928-E2D9-46D3-B95F-C4AF556D3C01" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F0B5583-8489-4AF9-AD04-4A56AC244A59" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C32DECD-1E28-4CC1-812B-E8D54B5703EE" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AD25BC1-E435-4691-B42A-0D98D80F0F83" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F58A3E7-4C21-48FD-AA26-7CCE85BAE887" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26950415-06AF-4910-A881-121EA0B43058" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89CFFAD2-F511-431C-BF24-08CA810B4645" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "675A7068-CE9E-412A-8159-2A3820D6272E" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC857372-A76D-4F3D-9FEE-6086A0AB002C" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA2D117B-2800-462A-BA58-E71AED33EEFA" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08729570-512B-4B7E-A055-B8E312F41E86" }, { "criteria": "cpe:2.3:a:xoops:xoops:2.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "476872A3-838B-40B7-B180-2FE018EA9BE1" } ], "operator": "OR" } ] } ]