CVE-2009-1409

CVSS V2 Medium 5.1 CVSS V3 None
Description
SQL injection vulnerability in usersettings.php in e107 0.7.15 and earlier, when "Extended User Fields" is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the hide parameter, a different vector than CVE-2005-4224 and CVE-2008-5320.
Overview
  • CVE ID
  • CVE-2009-1409
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2009-04-24T14:30:00
  • Last Modified Date
  • 2017-09-29T01:34:22
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:* 0 OR 0.7.15
cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.547_beta:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.548_beta:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.549_beta:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.551_beta:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.552_beta:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.553_beta:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.554_beta:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.555_beta:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:1.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.3_beta:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.3_beta2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.4_beta1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.4_beta3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.4_beta4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.4_beta5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.4_beta6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.05:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:e107:e107:5.21:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:H/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • HIGH
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5.1
  • Severity
  • MEDIUM
  • Exploitability Score
  • 4.9
  • Impact Score
  • 6.4
History
Created Old Value New Value Data Type Notes
2022-05-10 08:19:10 Added to TrackCVE