CVE-2013-2945 – b2evolution 4.1.6 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2013-2945
SQL injection vulnerability in blogs/admin.php in b2evolution before 4.1.7 allows remote authenticated administrators to execute arbitrary SQL commands via the show_statuses[] parameter. NOTE: this can be leveraged using CSRF to allow remote unauthenticated attackers to execute arbitrary SQL commands. Vulnerabilidad de inyección SQL en blogs/admin.php en b2evolution anterior a 4.1.7 permite a administradores remotos autenticados ejecutar comandos SQL arbitrarios a través del parámetro show_statuses[]. NOTA: esto puede ser aprovechado utilizando CSRF para permitir a atacantes no autenticados ejecutar comandos SQL arbitrarios. b2evolution version 4.1.6 suffers from remote SQL injection and cross site request forgery vulnerabilities. • https://www.exploit-db.com/exploits/25298 http://archives.neohapsis.com/archives/bugtraq/2013-05/0004.html http://b2evolution.net/news/2013/04/29/b2evolution-4-1-7-and-5-0-3 http://osvdb.org/92905 http://packetstormsecurity.com/files/121481/b2evolution-4.1.6-SQL-Injection.html http://www.securityfocus.com/bid/59599 https://exchange.xforce.ibmcloud.com/vulnerabilities/83950 https://www.htbridge.com/advisory/HTB23152 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2012-5911
https://notcve.org/view.php?id=CVE-2012-5911
Cross-site scripting (XSS) vulnerability in blogs/blog1.php in b2evolution 4.1.3 allows remote attackers to inject arbitrary web script or HTML via the message body. Una vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en blogs/blog1.php en b2evolution v4.1.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del cuerpo del mensaje. • http://b2evolution.net/news/2012/04/06/b2evolution-4-1-4-stable http://osvdb.org/80672 http://packetstormsecurity.org/files/111294/B2Evolution-CMS-4.1.3-SQL-Injection.html http://vulnerability-lab.com/get_content.php?id=482 http://www.securityfocus.com/bid/52783 https://exchange.xforce.ibmcloud.com/vulnerabilities/74458 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2012-5910
https://notcve.org/view.php?id=CVE-2012-5910
SQL injection vulnerability in blogs/htsrv/viewfile.php in b2evolution 4.1.3 allows remote authenticated users to execute arbitrary SQL commands via the root parameter. Vulnerabilidad de inyección SQL en blogs/htsrv/viewfile.php en b2evolution v4.1.3 permite a usuarios remotos autenticados ejecutar comandos SQL de su elección a través del parámetro root. • http://b2evolution.net/news/2012/04/06/b2evolution-4-1-4-stable http://osvdb.org/80671 http://packetstormsecurity.org/files/111294/B2Evolution-CMS-4.1.3-SQL-Injection.html http://vulnerability-lab.com/get_content.php?id=482 http://www.securityfocus.com/bid/52783 https://exchange.xforce.ibmcloud.com/vulnerabilities/74457 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2011-3709
https://notcve.org/view.php?id=CVE-2011-3709
b2evolution 3.3.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by locales/ru_RU/ru-RU.locale.php and certain other files. b2evolution v3.3.3 permite a atacantes remotos obtener información sensible a través de una petición directa a un archivo .php, lo que revela la ruta de instalación en un mensaje de error, como se demostró con locales/ru_RU/ru-RU.locale.php y algunos otros archivos. • http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/b2evolution-3.3.3 http://www.openwall.com/lists/oss-security/2011/06/27/6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2007-2681
https://notcve.org/view.php?id=CVE-2007-2681
Directory traversal vulnerability in blogs/index.php in b2evolution 1.6 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the core_subdir parameter. Vulnerabilidad de salto de directorio en blogs/index.php en b2evolution 1.6 permite a atacantes remotos incluir y ejecutar archivos locales de su elección a través de la secuencia ..(punto punto) en el parámetro core_subdir. • http://securityreason.com/securityalert/2697 http://www.securityfocus.com/archive/1/465733/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/33687 •