| Title | Dotclear の admin/categories.php における SQL インジェクションの脆弱性 |
|---|---|
| Summary | Dotclear の admin/categories.php には、SQL インジェクションの脆弱性が存在します。 |
| Possible impacts | カテゴリの管理権限を持つリモート認証されたユーザにより、categories_order パラメータを介して、任意の SQL コマンドを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | May 16, 2014, midnight |
| Registration Date | May 26, 2014, 12:10 p.m. |
| Last Update | June 3, 2014, 5:20 p.m. |
| CVSS2.0 : 警告 | |
| Score | 6 |
|---|---|
| Vector | AV:N/AC:M/Au:S/C:P/I:P/A:P |
| Dotclear |
| Dotclear 2.6.3 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2014年05月26日] 掲載 [2014年06月03日] CVSS による深刻度:内容を更新 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | SQL injection vulnerability in admin/categories.php in Dotclear before 2.6.3 allows remote authenticated users with the manage categories permission to execute arbitrary SQL commands via the categories_order parameter. |
|---|---|
| Publication Date | May 23, 2014, 12:13 a.m. |
| Registration Date | Jan. 26, 2021, 3:11 p.m. |
| Last Update | Nov. 21, 2024, 11:08 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:dotclear:dotclear:1.2.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0:beta_7:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0:beta_5.4:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0:beta_5.2:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.4.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:* | 2.6.2 | ||||
| cpe:2.3:a:dotclear:dotclear:2.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.4.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.6:rc:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:1.2.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0:beta_3:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:1.2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.3.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.6.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0:beta_4:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:1.2.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.4.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.1.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.1.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0:beta_2:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.2.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0:beta_6:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.5.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.6:-:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:1.2.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.0:rc2:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:1.2.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.1.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:1.2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:2.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:dotclear:dotclear:1.2.8:*:*:*:*:*:*:* | |||||