[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108530

 
 

909

 
 

85343

 
 

134

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2011-0432Date: (C)2011-03-14   (M)2018-04-12


Multiple SQL injection vulnerabilities in the get_userinfo method in the MySQLAuthHandler class in DAVServer/mysqlauth.py in PyWebDAV before 0.9.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) user or (2) pw argument. NOTE: some of these details are obtained from third party information.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 7.5
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: PARTIAL
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  
Reference:
SECUNIA-43571
SECUNIA-43602
SECUNIA-43703
BID-46655
ADV-2011-0553
ADV-2011-0554
ADV-2011-0634
DSA-2177
FEDORA-2011-2427
FEDORA-2011-2460
FEDORA-2011-2470
http://code.google.com/p/pywebdav/updates/list
http://pywebdav.googlecode.com/files/PyWebDAV-0.9.4.1.tar.gz
https://bugzilla.redhat.com/show_bug.cgi?id=677718

CWE    1
CWE-89
OVAL    4
oval:org.secpod.oval:def:600188
oval:org.secpod.oval:def:101279
oval:org.secpod.oval:def:101280
oval:org.secpod.oval:def:103204
...

© SecPod Technologies