// For flags

CVE-2013-7149

Revive Adserver 3.0.1 SQL Injection

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

SQL injection vulnerability in www/delivery/axmlrpc.php (aka the XML-RPC delivery invocation script) in Revive Adserver before 3.0.2, and OpenX Source 2.8.11 and earlier, allows remote attackers to execute arbitrary SQL commands via the what parameter to an XML-RPC method.

Vulnerabilidad de inyección SQL en www / entrega / axmlrpc.php (también conocido como el XML-RPC invocación de entrega de script) en Revive Adserver antes de 3.0.2, y OpenX Fuente 2.8.11 y anteriores, permite a atacantes remotos ejecutar comandos SQL a través del parámetro de lo que a un método de XML-RPC.

Revive Adserver versions 3.0.1 and below suffer from a remote SQL injection vulnerability. The XML-RPC delivery invocation script was failing to escape its input parameters in the same way the other delivery methods do, allowing attackers to inject arbitrary SQL code via the "what" parameter of the delivery XML-RPC methods. Also, the escaping technique used to handle such parameter in the delivery scripts was based on the addslashes PHP function and has now been upgraded to use the dedicated escaping functions for the database in use.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-12-19 CVE Reserved
  • 2013-12-20 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openx
Search vendor "Openx"
Openx
Search vendor "Openx" for product "Openx"
<= 2.8.11
Search vendor "Openx" for product "Openx" and version " <= 2.8.11"
-
Affected
Openx
Search vendor "Openx"
Openx
Search vendor "Openx" for product "Openx"
2.8.10
Search vendor "Openx" for product "Openx" and version "2.8.10"
-
Affected
Revive-adserver
Search vendor "Revive-adserver"
Revive Adserver
Search vendor "Revive-adserver" for product "Revive Adserver"
<= 3.0.1
Search vendor "Revive-adserver" for product "Revive Adserver" and version " <= 3.0.1"
-
Affected
Revive-adserver
Search vendor "Revive-adserver"
Revive Adserver
Search vendor "Revive-adserver" for product "Revive Adserver"
3.0.0
Search vendor "Revive-adserver" for product "Revive Adserver" and version "3.0.0"
-
Affected