fkie_cve-2013-4715
Vulnerability from fkie_nvd
Published
2013-11-06 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
SQL injection vulnerability in Tiki Wiki CMS Groupware 6 LTS before 6.13LTS, 9 LTS before 9.7LTS, 10.x before 10.4, and 11.x before 11.1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| tiki | tikiwiki_cms\/groupware | 6.8 | |
| tiki | tikiwiki_cms\/groupware | 6.9 | |
| tiki | tikiwiki_cms\/groupware | 6.10 | |
| tiki | tikiwiki_cms\/groupware | 6.11 | |
| tiki | tikiwiki_cms\/groupware | 6.12 | |
| tiki | tikiwiki_cms\/groupware | 9.0 | |
| tiki | tikiwiki_cms\/groupware | 9.0 | |
| tiki | tikiwiki_cms\/groupware | 9.0 | |
| tiki | tikiwiki_cms\/groupware | 9.0 | |
| tiki | tikiwiki_cms\/groupware | 9.1 | |
| tiki | tikiwiki_cms\/groupware | 9.2 | |
| tiki | tikiwiki_cms\/groupware | 9.2 | |
| tiki | tikiwiki_cms\/groupware | 9.3 | |
| tiki | tikiwiki_cms\/groupware | 9.4 | |
| tiki | tikiwiki_cms\/groupware | 9.5 | |
| tiki | tikiwiki_cms\/groupware | 9.6 | |
| tiki | tikiwiki_cms\/groupware | 10.0 | |
| tiki | tikiwiki_cms\/groupware | 10.0 | |
| tiki | tikiwiki_cms\/groupware | 10.0 | |
| tiki | tikiwiki_cms\/groupware | 10.1 | |
| tiki | tikiwiki_cms\/groupware | 10.2 | |
| tiki | tikiwiki_cms\/groupware | 10.3 | |
| tiki | tikiwiki_cms\/groupware | 11.0 | |
| tiki | tikiwiki_cms\/groupware | 11.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.8:-:lts:*:*:*:*:*",
"matchCriteriaId": "673A659F-B843-480D-83AB-C762A14A9CE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.9:-:lts:*:*:*:*:*",
"matchCriteriaId": "120FCD3A-F2B6-4FA4-813D-86582005AF0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.10:-:lts:*:*:*:*:*",
"matchCriteriaId": "D95B1ADB-A1B7-487C-9F16-EE59ADFDE2F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.11:-:lts:*:*:*:*:*",
"matchCriteriaId": "DBFB9525-CF5A-4E68-A7C9-7E3E41926AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.12:-:lts:*:*:*:*:*",
"matchCriteriaId": "8E51032C-F31F-4164-980D-6D5D3794F92B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.0:-:lts:*:*:*:*:*",
"matchCriteriaId": "68224364-8C2A-49EA-9699-DC25D442C740",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.0:alpha:lts:*:*:*:*:*",
"matchCriteriaId": "A61EF962-848E-40BA-B91A-00118760E4AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.0:beta:lts:*:*:*:*:*",
"matchCriteriaId": "3ED7B1F4-35AF-4620-A000-63010838C253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.0:beta2:lts:*:*:*:*:*",
"matchCriteriaId": "1061E898-85F8-40DC-83A1-978B22EBDE3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.1:-:lts:*:*:*:*:*",
"matchCriteriaId": "36855536-80A2-4DA3-A1F1-294534D3CBB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.2:-:lts:*:*:*:*:*",
"matchCriteriaId": "41241234-0D3B-4A21-8DDE-DF13531737DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.2:beta1:lts:*:*:*:*:*",
"matchCriteriaId": "757E5585-B4CD-4B72-86D7-C3ED1E4210F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.3:-:lts:*:*:*:*:*",
"matchCriteriaId": "968103DF-4FED-4B79-9470-85D0EFF46C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.4:-:lts:*:*:*:*:*",
"matchCriteriaId": "A17C32D6-3AD0-47B9-A535-F45AF36DBB77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.5:-:lts:*:*:*:*:*",
"matchCriteriaId": "D0E5E8F4-4BEE-44BC-8DCC-CC0C8E7B7D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.6:-:lts:*:*:*:*:*",
"matchCriteriaId": "9FA3D2C3-0787-48BB-BD2C-90082B56E399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26BC8370-486A-4CDD-89FA-0A154DAA4350",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "111106F2-2985-4E57-A136-59FC0685F553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "41F4F831-07B8-4750-9C99-6FDE291E2106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "996A3D2F-80FA-4D92-B990-E39A90107E42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "959E9B5C-9D7C-4EAD-8FE6-1D8B165BBEBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0B836D-5D99-48FF-A099-A39FFFD79507",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "30D43901-AC30-4EE7-9E60-374EAB7A70E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:11.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "DFCBEC25-6DA1-47E7-803E-199117BC6987",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in Tiki Wiki CMS Groupware 6 LTS before 6.13LTS, 9 LTS before 9.7LTS, 10.x before 10.4, and 11.x before 11.1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Tiki Wiki CMS Groupware 6 LTS anterior a 6.13LTS, 9 LTS anterior 9.7LTS, 10.x anterior a 10.4, 11.x anterior a 11.1 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2013-4715",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-11-06T15:55:06.453",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://info.tiki.org/article221-New-Versions-of-all-supported-versions-of-Tiki-Wiki-CMS-Groupware"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN75720314/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000100"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://info.tiki.org/article221-New-Versions-of-all-supported-versions-of-Tiki-Wiki-CMS-Groupware"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN75720314/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000100"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…