CVE-2009-2147
Published Jun 22, 2009
Last updated 7 years ago
Overview
- Description
- SQL injection vulnerability in fdown.php in phpWebThings 1.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C13415B-8752-4CDE-B566-73F9F22BBC96", "versionEndIncluding": "1.5.2" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7F2E20D-4AA9-41CE-AF0A-28DCB65C947E" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "566463D1-B366-408C-B27A-0450C6C3AE6E" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:0.2b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1526ABB2-DBD2-4080-8944-61F9ABDA75D0" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20B1FA8A-8A72-4986-B6F0-F0AED7ACA7A6" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26ACF325-11B6-49C3-B85F-33256E3FDDDA" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:0.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E87432E8-E5ED-4746-BBC9-C519F364FBC5" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:0.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBF75D6A-33B7-4B74-8148-3F1AAA8E7DFF" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:0.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "604FE388-8339-4EB1-848E-B21F96FE691D" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33F2C338-BBF1-4FAD-8D1C-1B2D4D72644F" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:1.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0D45F83-BD58-4145-A89D-25B81D442DC1" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D302871A-63CF-4B49-A180-CD44E941971C" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:1.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "921E79A6-ABC9-4804-B016-7049F13C905C" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:1.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E207E3F4-FC8F-4931-BF9C-40C2C516B500" }, { "criteria": "cpe:2.3:a:phpwebthings:phpwebthings:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49D54FDD-2EC5-40C7-ACD7-B4D56B27F7D6" } ], "operator": "OR" } ] } ]