CVE-2007-6433
EJBQL injection via 'order' parameter
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The getRenderedEjbql method in the org.jboss.seam.framework.Query class in JBoss Seam 2.x before 2.0.0.CR3 allows remote attackers to inject and execute arbitrary EJBQL commands via the order parameter.
El método getRenderedEjbql en la clase org.jboss.seam.framework.Query en JBoss Seam 2.x anterior a 2.0.0.CR3 permite a atacantes remotos inyectar y ejecutar comandos EJBQL de su elección a través del parámetro order.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-12-18 CVE Reserved
- 2007-12-18 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2024-10-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://osvdb.org/42631 | Vdb Entry | |
http://sourceforge.net/project/shownotes.php?release_id=549490&group_id=22866 | X_refsource_confirm | |
http://www.securityfocus.com/bid/26850 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/4215 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://jira.jboss.com/jira/browse/JBSEAM-2084 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/28077 | 2011-03-08 | |
http://www.redhat.com/support/errata/RHSA-2008-0151.html | 2011-03-08 | |
http://www.redhat.com/support/errata/RHSA-2008-0158.html | 2011-03-08 | |
http://www.redhat.com/support/errata/RHSA-2008-0213.html | 2011-03-08 | |
https://access.redhat.com/security/cve/CVE-2007-6433 | 2008-04-02 | |
https://bugzilla.redhat.com/show_bug.cgi?id=426206 | 2008-04-02 |