Vulnerability Details : CVE-2010-1918
SQL injection vulnerability in ask_chat.php in eFront 3.6.2 and earlier allows remote attackers to execute arbitrary SQL commands via the chatrooms_ID parameter.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2010-1918
Probability of exploitation activity in the next 30 days: 2.26%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-1918
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2010-1918
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-1918
-
http://www.php-security.org/2010/05/09/mops-2010-018-efront-ask_chat-chatrooms_id-sql-injection-vulnerability/index.html
MOPS-2010-018: EFront ask_chat chatrooms_ID SQL Injection Vulnerability « the Month of PHP SecurityExploit
-
http://www.securityfocus.com/bid/40032
eFront 'ask_chat.php' SQL Injection VulnerabilityExploit
-
http://www.vupen.com/english/advisories/2010/1101
Webmail | OVH- OVHVendor Advisory
-
http://packetstormsecurity.org/1005-exploits/MOPS-2010-018.pdf
Files ≈ Packet StormExploit
Products affected by CVE-2010-1918
- cpe:2.3:a:efrontlearning:efront:*:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.5.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.5.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.5.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.5.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:efrontlearning:efront:3.6.1:*:*:*:*:*:*:*