Vulnerability Details : CVE-2013-6001
SQL injection vulnerability in the Space function in Cybozu Garoon before 3.7 SP1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2013-6001
Probability of exploitation activity in the next 30 days: 0.26%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 64 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-6001
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2013-6001
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6001
-
http://products.cybozu.co.jp/garoon/download/update/gr3/fix371sp1.html
3.7 Service Pack 1における改修内容 | アップデート履歴 | 試用 | エンタープライズ グループウェア サイボウズ ガルーン 3
-
http://cs.cybozu.co.jp/information/20131202up01.php
サイボウズ ガルーン 3.7 脆弱性情報のお知らせ【CY13-12-001】 | サイボウズからのお知らせ
-
http://jvn.jp/en/jp/JVN82375148/index.html
JVN#82375148: Cybozu Garoon vulnerable to SQL injection
-
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000114
JVNDB-2013-000114 - JVN iPedia - 脆弱性対策情報データベース
-
https://support.cybozu.com/ja-jp/article/6955
不具合情報公開サイトVendor Advisory
Products affected by CVE-2013-6001
- cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.5:sp4:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.5:sp5:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.5:sp2:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.5:sp1:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.5:sp3:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.0:sp5:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.0:sp4:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:3.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.5:sp4:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.5:sp3:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.5:sp2:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.0:sp6:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:cybozu:garoon:2.5:sp1:*:*:*:*:*:*