Vulnerability Details : CVE-2013-3961
SQL injection vulnerability in edit_event.php in Simple PHP Agenda before 2.2.9 allows remote authenticated users to execute arbitrary SQL commands via the eventid parameter.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2013-3961
Probability of exploitation activity in the next 30 days: 0.44%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 72 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-3961
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2013-3961
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3961
-
http://www.webera.fr/advisory-02-php-agenda-isql-exploit
Advisory 02 php agenda iSQL exploit – WebEraExploit;Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/84938
Simple PHP Agenda eventid parameter SQL injection CVE-2013-3961 Vulnerability Report
-
http://seclists.org/fulldisclosure/2013/Jun/67
Full Disclosure: [CVE-2013-3961] iSQL in php-agenda <= 2.2.8Exploit;Issue Tracking
-
http://packetstormsecurity.com/files/121978/Simple-PHP-Agenda-2.2.8-SQL-Injection.html
Simple PHP Agenda 2.2.8 SQL Injection ≈ Packet StormExploit;Third Party Advisory
-
http://www.securityfocus.com/bid/60481
Simple PHP Agenda 'edit_event.php' SQL Injection VulnerabilityExploit;Third Party Advisory
-
http://www.exploit-db.com/exploits/26136
Simple PHP Agenda 2.2.8 - 'edit_event.php?eventid' SQL Injection - PHP webapps ExploitExploit
Products affected by CVE-2013-3961
- cpe:2.3:a:abeel:simple_php_agenda:*:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.1:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:abeel:simple_php_agenda:0.2.1:*:*:*:*:*:*:*