Vulnerability Description
SQL injection vulnerability in port/modifyportform.php in Open Source Security Information Management (OSSIM) 0.9.9 rc5 allows remote authenticated users to execute arbitrary SQL commands via the portname parameter, which is not properly handled by a validation regular expression.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open Source Security Information Management | Os-Sim | <= 0.9.9 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/29046
- http://securityreason.com/securityalert/3689
- http://www.securityfocus.com/archive/1/488450/100/0/threaded
- http://www.securityfocus.com/archive/1/488617/100/0/threaded
- http://www.securityfocus.com/bid/27927Exploit
- https://www.exploit-db.com/exploits/5171
- http://secunia.com/advisories/29046
- http://securityreason.com/securityalert/3689
- http://www.securityfocus.com/archive/1/488450/100/0/threaded
- http://www.securityfocus.com/archive/1/488617/100/0/threaded
- http://www.securityfocus.com/bid/27927Exploit
- https://www.exploit-db.com/exploits/5171
FAQ
What is CVE-2008-0920?
CVE-2008-0920 is a vulnerability with a CVSS score of 6.5 (MEDIUM). SQL injection vulnerability in port/modifyportform.php in Open Source Security Information Management (OSSIM) 0.9.9 rc5 allows remote authenticated users to execute arbitrary SQL commands via the port...
How severe is CVE-2008-0920?
CVE-2008-0920 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0920?
Check the references section above for vendor advisories and patch information. Affected products include: Open Source Security Information Management Os-Sim.