製品・ソフトウェアに関する情報
Dotclear の admin/categories.php における SQL インジェクションの脆弱性
Title Dotclear の admin/categories.php における SQL インジェクションの脆弱性
Summary

Dotclear の admin/categories.php には、SQL インジェクションの脆弱性が存在します。

Possible impacts カテゴリの管理権限を持つリモート認証されたユーザにより、categories_order パラメータを介して、任意の SQL コマンドを実行される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date May 16, 2014, midnight
Registration Date May 26, 2014, 12:10 p.m.
Last Update June 3, 2014, 5:20 p.m.
CVSS2.0 : 警告
Score 6
Vector AV:N/AC:M/Au:S/C:P/I:P/A:P
Affected System
Dotclear
Dotclear 2.6.3 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2014年05月26日]
  掲載
[2014年06月03日]
  CVSS による深刻度:内容を更新
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2014-3783
Summary

SQL injection vulnerability in admin/categories.php in Dotclear before 2.6.3 allows remote authenticated users with the manage categories permission to execute arbitrary SQL commands via the categories_order parameter.

Publication Date May 23, 2014, 12:13 a.m.
Registration Date Jan. 26, 2021, 3:11 p.m.
Last Update Nov. 21, 2024, 11:08 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:dotclear:dotclear:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_7:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_5.4:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_5.2:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:* 2.6.2
cpe:2.3:a:dotclear:dotclear:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.6:rc:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_3:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_4:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_2:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_6:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.6:-:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.2:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.8:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List