CVE-2008-2999
Published Jul 3, 2008
Last updated 7 years ago
Overview
- Description
- Multiple SQL injection vulnerabilities in the Aggregation module 5.x before 5.x-4.4 for Drupal allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Evaluator
- Comment
- -
- Impact
- Per Hyperlink Record 1026625, Drupal core is not affected. If you do not use the contributed Aggregation module, there is nothing you need to do.
- Solution
- Per Hyperlink Record 1026625, Drupal core is not affected. If you do not use the contributed Aggregation module, there is nothing you need to do.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:aggregation_module:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CF7A917-F319-4C29-A843-99A36B4A83B5" }, { "criteria": "cpe:2.3:a:drupal:aggregation_module:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A64D861C-D011-4CE6-B7C6-EEB4D7CCDC81" }, { "criteria": "cpe:2.3:a:drupal:aggregation_module:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CA6032D-27F3-4D80-8714-7F3ACA2E8836" }, { "criteria": "cpe:2.3:a:drupal:aggregation_module:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D6F71C3-0DCB-418A-8FD4-072D49CF9945" }, { "criteria": "cpe:2.3:a:drupal:aggregation_module:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F16FEA3A-265F-4332-A1A1-2879CA5682CC" }, { "criteria": "cpe:2.3:a:drupal:aggregation_module:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C57C2C4F-F4EC-4A25-841D-8597EB1582B9" }, { "criteria": "cpe:2.3:a:drupal:aggregation_module:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E8D028E-51F2-4BE9-99F3-85D1BE440FA7" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDBE79A6-5762-4A7C-8FDA-C11FFFDCFC9B" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5BCAB7B-DF79-4DB8-A5C4-731F251A02A2" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.1_rev1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87BF63E1-FB1A-4D76-BF0D-F07267127504" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5AEAB73-F7A9-4C62-BCB6-1028DAF149DB" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF34F79B-6B1B-45CA-82BA-24D4254B26DF" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C4C5857-3690-4D74-B135-B6AB7E766FB7" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.5.:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "698B4A81-4A20-4BD8-B0E5-3335B7DC190C" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "327712EE-8E9B-4A62-94A8-504C9CD2DE97" } ], "operator": "OR" } ] } ]