#VU42847 SQL injection in Vanilla - CVE-2013-3527
Published: May 11, 2013 / Updated: February 11, 2021
Vanilla
Lussumo
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the parameter name in the Form/Email array to (1) entry/signin or (2) entry/passwordrequest. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://archives.neohapsis.com/archives/bugtraq/2013-04/0068.html
- http://mfs-enterprise.com/wordpress/2013/04/05/vanilla-forums-2-0-18-sql-injection-insert-arbitrary-user-dump-usertable/
- http://osvdb.org/92109
- http://osvdb.org/92110
- http://packetstormsecurity.com/files/121151/Vanilla-Forums-2.0.18.4-SQL-Injection.html
- http://seclists.org/fulldisclosure/2013/Apr/57
- http://secunia.com/advisories/52825
- http://vanillaforums.org/discussion/23339/security-update-vanilla-2-0-18-7
- http://www.exploit-db.com/exploits/24927
- http://www.securityfocus.com/bid/58922
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83289
- https://github.com/vanillaforums/Garden/commit/83078591bc4d263e77d2a2ca283100997755290d