Vulnerability Details : CVE-2009-1409
SQL injection vulnerability in usersettings.php in e107 0.7.15 and earlier, when "Extended User Fields" is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the hide parameter, a different vector than CVE-2005-4224 and CVE-2008-5320.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2009-1409
Probability of exploitation activity in the next 30 days: 0.18%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 54 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-1409
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
CWE ids for CVE-2009-1409
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-1409
Products affected by CVE-2009-1409
- cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.555_beta:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.549_beta:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.551_beta:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.554_beta:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.547_beta:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.548_beta:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.04:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.4_beta3:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.4_beta4:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.4_beta5:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.3_beta2:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.4_beta1:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.05:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.4_beta6:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.552_beta:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.553_beta:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.21:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.3_beta:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:*