Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", "matchCriteriaId": "19FA5E3B-5F78-4D79-8507-9168136134D9", "versionEndIncluding": "0.83.8", "vulnerable": true}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.83:*:*:*:*:*:*:*", "matchCriteriaId": "E14F94C4-4ED5-44A4-A017-5EC66E3210F9", "vulnerable": true}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.1:*:*:*:*:*:*:*", "matchCriteriaId": "4B80B37D-CAF3-4109-95A9-F49E28B938C1", "vulnerable": true}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.2:*:*:*:*:*:*:*", "matchCriteriaId": "DB316B74-8FE4-40A6-A0D3-C4CD88CB9656", "vulnerable": true}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.3:*:*:*:*:*:*:*", "matchCriteriaId": "3D4574B9-E843-4D7A-A9E3-938051A048B0", "vulnerable": true}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.4:*:*:*:*:*:*:*", "matchCriteriaId": "BB555723-6E7F-4D0F-92B9-BE1ACD7DBD97", "vulnerable": true}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.5:*:*:*:*:*:*:*", "matchCriteriaId": "9002F098-D328-413E-9A1D-14B5759C4B07", "vulnerable": true}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C1AC97A-6C1E-4AD4-B7E4-272224E2DBC4", "vulnerable": true}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.7:*:*:*:*:*:*:*", "matchCriteriaId": "D54783ED-47B3-4A86-A905-3A47BF1DFFF3", "vulnerable": true}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.83.31:*:*:*:*:*:*:*", "matchCriteriaId": "692076F9-0855-45B1-B19E-63C9D3902511", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en GLPI anterior a 0.83.9 permiten a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro (1) users_id_assign en ajax/ticketassigninformation.php, (2) filename en front/document.form.php o (3) table en ajax/comments.php."}], "id": "CVE-2013-2226", "lastModified": "2024-11-21T01:51:17.140", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-05-14T19:55:08.403", "references": [{"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.glpi-project.org/spip.php?page=annonce&id_breve=297&lang=en&debut_autres_breves="}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/60693"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.glpi-project.org/spip.php?page=annonce&id_breve=297&lang=en&debut_autres_breves="}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/60693"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-89"}], "source": "nvd@nist.gov", "type": "Primary"}]}