fkie_cve-2011-3615
Vulnerability from fkie_nvd
Published
2011-10-24 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple SQL injection vulnerabilities in Simple Machines Forum (SMF) before 1.1.15 and 2.x before 2.0.1 allow remote attackers to execute arbitrary SQL commands via vectors involving a (1) HTML entity or (2) display name. NOTE: some of these details are obtained from third party information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simplemachines:smf:*:*:*:*:*:*:*:*", "matchCriteriaId": "F171B1A4-FA42-42B5-BAF7-857A41D575EC", "versionEndIncluding": "1.1.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7A85D503-FACF-4814-8E67-E6EEE93FB23D", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "C8BA3B1D-A1F6-419B-9944-AF01B785C626", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0:beta4.1:*:*:*:*:*:*", "matchCriteriaId": "6B164981-7F13-43B3-BA29-4F4D52EAC466", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "838FA5D8-79E6-4B42-BC0A-51FEA2515442", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "C7CC60C4-EED4-41AA-A5DF-5332E6D66E80", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B9F73B7F-8FF3-4A13-943D-C6BF353A5296", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "63FA8C3A-ACF7-4C97-9380-9E144FDF7DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E019CBA-7837-4260-8A86-559C483E405C", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AD93454-C8FA-4966-96D1-AA7DFA0D3C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "07D1D8AB-9927-41D5-A81B-B035B661D7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "543D57E7-B3D0-4714-B5FB-336A1627E1A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "6FECEABB-BE07-412B-9A08-EAC79A5215D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2A55E760-7CD8-4590-86B9-11ACA1202A23", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1397297A-7087-42AD-B3D6-1DAA71D3E6DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0958C-8FC7-44B2-819D-6688A7D40632", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A454C424-E1CD-46A4-A9AC-12BB22400D64", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "732474E6-B87C-4AFA-9868-3559634A688D", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "A3F625DB-65E9-41FB-B733-CC4AEF1B9895", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "DD622FF4-C724-4D50-9712-5E632F3E83CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "D01CD63D-16B7-4D98-9E67-CF0838A65FFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "46A72FB0-88A3-4E2E-B34C-E51EE91A51E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "79296012-575A-42EC-9E9A-4549346D7475", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "25089E42-354D-4A0C-8845-01F6800446D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "60A992F6-5BD0-458B-A813-6EA539249FAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "A8C8198A-38C0-481A-BDBE-D193E69C5462", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "95AE6F3E-1B4C-425B-8B9C-DD32B534F234", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "71405233-0271-4081-B082-208A74B2E8B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "682BE6FC-F9FC-4C90-A56B-EC05B518C55F", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "7122D896-354C-4E62-B507-1898DEC6F00E", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "17C92F5C-C1C9-4D05-B096-755CC6DFAA51", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1:beta3:*:*:*:*:*:*", "matchCriteriaId": "268C6140-13DE-43F2-958D-7882AC342E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1:beta4:*:*:*:*:*:*", "matchCriteriaId": "755E8504-6C4A-467A-835B-222EEB77CE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "EB5AF099-0B41-48C6-810E-A4AF7B3EB646", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "4CFE75DC-93E1-487B-B50C-1465A98956AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "920956A5-C343-4FCF-9BF3-F4E8C79F9993", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "1539E360-712B-4DF1-813C-82F87C0946FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2530C440-9C8C-4966-88B0-176D8FEBDFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "565A8842-9B1E-4764-85E2-021F7825A1CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "603B3808-FDFF-432E-8937-984897377BB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "B5656FF9-3F20-476C-A3F7-69EED049E669", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5187CA56-26DD-4042-82DC-FCD0CB8A84FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB527C06-DEAB-416D-ABBD-F0A7F33F91D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A8C2083-53A9-4E71-A268-D8690A288F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0127EAC8-B363-4262-B80E-FF7415701038", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "D6FEC752-D94D-4D0D-BC96-82654F69144D", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "E5188CC8-45B8-4A07-B474-6B92C7F15276", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "C8B91D95-8F28-4D12-9953-5DE092654009", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "6809AA5E-49CE-456B-AD18-065154A61ECB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9CB71788-5E98-41F4-A49B-B1481DB2AAD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "AFBA92BD-F323-4786-A31E-E01642CFD415", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "CE71E13C-0DDE-46ED-99E1-0D71E6539EE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:beta2.1:*:*:*:*:*:*", "matchCriteriaId": "E54A4CD9-AB69-4DF9-AA3A-0C3A0532FF15", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D6BDF574-AD5F-44AB-95AB-1790E4563977", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:beta3.1:*:*:*:*:*:*", "matchCriteriaId": "62B1D7AB-039A-4496-A55C-6BFCFC40BD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "804FC715-BF72-4E2D-8129-6E499E3F48F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B4B5EA47-4175-4E39-A2E8-66CF592DFA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:rc1.2:*:*:*:*:*:*", "matchCriteriaId": "B37BDC8B-C00C-4443-A1DD-C1823E064940", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "3DE1E832-43E7-4650-9F48-FDEEB75C1B93", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "FEEDEDCF-E956-4F2E-B13D-9E63DF6B31AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "5582EEF9-33A8-42C0-A2BF-E0A1EA431187", "vulnerable": true }, { "criteria": "cpe:2.3:a:simplemachines:smf:2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "4F0ADA12-A87E-44EE-80FC-E15C244A2F57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in Simple Machines Forum (SMF) before 1.1.15 and 2.x before 2.0.1 allow remote attackers to execute arbitrary SQL commands via vectors involving a (1) HTML entity or (2) display name. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Multiples vulnerabilidades de inyecci\u00f3n SQL en Simple Machines Forum (SMF) anterios a v1.1.15 y v2.x anteriores a 2.0.1 que permiten a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a traves de vectores que incluyen una (1) entidad HTML o (2) muestran nombre. NOTA: algunos de estos detalles han sido obtenidos a partir de la informaci\u00f3n de terceros." } ], "evaluatorSolution": "Per: http://secunia.com/advisories/46386\r\n\r\n\u0027Solution Update to version 1.1.15 or version 2.0.1.\u0027", "id": "CVE-2011-3615", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-24T17:55:03.220", "references": [ { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/10/09/3" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/10/10/6" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/46386" }, { "source": "secalert@redhat.com", "url": "http://www.simplemachines.org/community/index.php?topic=452888.0" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/10/09/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/10/10/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/46386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.simplemachines.org/community/index.php?topic=452888.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70617" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…