Vulnerability Description
SQL injection vulnerability in LightNEasy.php in LightNEasy 3.2.1, when magic_quotes_gpc is disabled, allows remote authenticated users to execute arbitrary SQL commands via the id parameter in an edituser action, a different vector than CVE-2008-6593, CVE-2010-3484, and CVE-2010-3485.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lightneasy | Lightneasy | 3.2.1 |
Related Weaknesses (CWE)
References
- http://holisticinfosec.org/content/view/168/45/
- http://secunia.com/advisories/42391Vendor Advisory
- http://www.lightneasy.org/punbb/viewtopic.php?id=1207
- http://www.securityfocus.com/bid/45230
- https://exchange.xforce.ibmcloud.com/vulnerabilities/63723
- http://holisticinfosec.org/content/view/168/45/
- http://secunia.com/advisories/42391Vendor Advisory
- http://www.lightneasy.org/punbb/viewtopic.php?id=1207
- http://www.securityfocus.com/bid/45230
- https://exchange.xforce.ibmcloud.com/vulnerabilities/63723
FAQ
What is CVE-2010-4751?
CVE-2010-4751 is a vulnerability with a CVSS score of 6.0 (MEDIUM). SQL injection vulnerability in LightNEasy.php in LightNEasy 3.2.1, when magic_quotes_gpc is disabled, allows remote authenticated users to execute arbitrary SQL commands via the id parameter in an edi...
How severe is CVE-2010-4751?
CVE-2010-4751 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4751?
Check the references section above for vendor advisories and patch information. Affected products include: Lightneasy Lightneasy.