Vulnerability Description
SQL injection vulnerability in userlogin.jsp in Trivantis CourseMill Enterprise Learning Management System 4.1 SP4 allows remote attackers to execute arbitrary SQL commands via the user parameter (username field). NOTE: some of these details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trivantis | Coursemill Enterprise Learning Management System | 4.1 |
Related Weaknesses (CWE)
References
- http://packetstorm.linuxsecurity.com/0712-exploits/trivantis-sql.txtExploit
- http://secunia.com/advisories/28098
- http://securityreason.com/securityalert/3450
- http://www.osvdb.org/39156
- http://www.securityfocus.com/archive/1/485072/100/0/threaded
- http://www.securityfocus.com/bid/26865
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39031
- http://packetstorm.linuxsecurity.com/0712-exploits/trivantis-sql.txtExploit
- http://secunia.com/advisories/28098
- http://securityreason.com/securityalert/3450
- http://www.osvdb.org/39156
- http://www.securityfocus.com/archive/1/485072/100/0/threaded
- http://www.securityfocus.com/bid/26865
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39031
FAQ
What is CVE-2007-6338?
CVE-2007-6338 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in userlogin.jsp in Trivantis CourseMill Enterprise Learning Management System 4.1 SP4 allows remote attackers to execute arbitrary SQL commands via the user parameter (use...
How severe is CVE-2007-6338?
CVE-2007-6338 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6338?
Check the references section above for vendor advisories and patch information. Affected products include: Trivantis Coursemill Enterprise Learning Management System.