Vulnerability Details : CVE-2013-7149
SQL injection vulnerability in www/delivery/axmlrpc.php (aka the XML-RPC delivery invocation script) in Revive Adserver before 3.0.2, and OpenX Source 2.8.11 and earlier, allows remote attackers to execute arbitrary SQL commands via the what parameter to an XML-RPC method.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2013-7149
Probability of exploitation activity in the next 30 days: 0.28%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 65 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-7149
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2013-7149
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-7149
-
http://www.kreativrauschen.com/blog/2013/12/18/zero-day-vulnerability-in-openx-source-2-8-11-and-revive-adserver-3-0-1/
Zero Day Vulnerability in OpenX Source 2.8.11 and Revive Adserver 3.0.1 « Creation Noise
-
http://www.revive-adserver.com/security/REVIVE-SA-2013-001/
Revive Adserver Security Advisory SA-2013-001Vendor Advisory
-
http://www.securityfocus.com/archive/1/530471/30/0/threaded
SecurityFocus
Products affected by CVE-2013-7149
- cpe:2.3:a:openx:openx:*:*:*:*:*:*:*:*
- cpe:2.3:a:openx:openx:2.8.10:*:*:*:*:*:*:*
- cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*
- cpe:2.3:a:revive-adserver:revive_adserver:3.0.0:*:*:*:*:*:*:*