CVE-2009-4795
Published Apr 22, 2010
Last updated 7 years ago
Overview
- Description
- Multiple SQL injection vulnerabilities in Xlight FTP Server before 3.2.1, when ODBC authentication is enabled, allow remote attackers to execute arbitrary SQL commands via the (1) USER (aka username) or (2) PASS (aka password) command.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34CEFF75-78C3-4BFD-9579-F35B2ED29958", "versionEndIncluding": "3.2" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.60:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A095E2BA-9DDC-4437-94AE-CD8E842D6537" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.61:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3428DC26-7F45-4BBB-9480-C853FB33A163" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.62:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCAAE010-65FB-498A-AA77-DD23CF69725A" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.62a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "227A5BC0-A51A-46AF-B35F-3688BAD799DF" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.64:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9174BB48-5BDF-4C25-9965-4F67D011B57D" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:1.65:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62EA1606-2C20-421C-978B-43A7B0C21DD9" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F174E30-6756-4F62-A1C4-A4D409892A62" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7427D271-0E83-4B5F-803C-DCB6A3504D35" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FB359DE-B6BC-4E7F-85FD-1A034565AC45" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51742984-DC6B-4501-923C-10DB5EAEEB91" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF7F8B1B-3F92-4CCE-9102-0EAF8E60A1E3" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A846A19-E22C-4DB1-942E-7AE0F725163B" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21FF9580-C032-474C-9A61-606BF65AD57F" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63E458AA-4D75-4244-9C11-FEC58F906724" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.27:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD52F83D-936D-4E07-97EF-4A54BD220FB5" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.40:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D87135DA-CB8B-446A-AFF2-DC4F397B46D6" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.60:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A7C99B8-4040-4D38-B2FA-EAC2FCFD6E2F" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.70:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27011F11-454F-4341-80F9-DFB6CB0A35CD" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.72:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51F052CF-4B88-43BB-8D27-8C230C82F8A9" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.82:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CE3F312-776C-489A-BAA1-A9B0F2D7EE77" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.83:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "834CA462-A3A9-4386-B9B0-DC30E6BB8723" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.85:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68003E26-4B5C-4F99-AA1D-4DB5EC317FDF" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.86:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "422F109F-8E69-4251-8C79-E0DD4DA7DD5D" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.706:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58AEC9D0-C4B9-45C5-A290-C2CA760691EE" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.835:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B0AD8CF-3162-4517-959A-9FF2EEBCB53D" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:2.861:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DA9A959-2E9F-45FD-9C1A-D16E31074ED3" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5707DC3B-2DB8-456A-95B4-D80BFFEA320E" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CA12E92-2AC3-4F7E-BAF7-D92AF88A84CA" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C04AC89-8ABB-46BA-84CE-B2DDFC6294D8" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C94759C-5E4D-464F-9750-82E580740B60" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "790674EF-8E04-439F-BD20-463E25081AD2" }, { "criteria": "cpe:2.3:a:xlightftpd:xlight_ftp_server:3.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41683325-DE0B-4D22-8AF0-1A48D3CB651A" } ], "operator": "OR" } ] } ]