VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-3267
bugtracker.net: Multiple SQL injection vulnerabilities in BugTracke...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3267

Original

Multiple SQL injection vulnerabilities in BugTracker.NET before 3.4.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the qu_id parameter to bugs.aspx, (2) the row_id parameter to delete_query.aspx, the (3) new_project or (4) us_id parameter to edit_bug.aspx, or (5) the bug_list parameter to massedit.aspx. NOTE: some of these details are obtained from third party information.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-12-02
Source Information Category:
Advisory, Alert
Last Updated:
2010-12-02




Affected Product Tags
cpe:/a:ifdefined:bugtracker.net:0.91
cpe:/a:ifdefined:bugtracker.net:2.4.1
cpe:/a:ifdefined:bugtracker.net:2.4.2
cpe:/a:ifdefined:bugtracker.net:2.4.3
cpe:/a:ifdefined:bugtracker.net:2.4.4
cpe:/a:ifdefined:bugtracker.net:2.4.5
cpe:/a:ifdefined:bugtracker.net:2.4.6
cpe:/a:ifdefined:bugtracker.net:2.4.7
cpe:/a:ifdefined:bugtracker.net:2.4.8
cpe:/a:ifdefined:bugtracker.net:2.5.0
cpe:/a:ifdefined:bugtracker.net:2.5.1
cpe:/a:ifdefined:bugtracker.net:2.5.2
cpe:/a:ifdefined:bugtracker.net:2.5.3
cpe:/a:ifdefined:bugtracker.net:2.5.4
cpe:/a:ifdefined:bugtracker.net:2.5.5
cpe:/a:ifdefined:bugtracker.net:2.5.6
cpe:/a:ifdefined:bugtracker.net:2.5.7
cpe:/a:ifdefined:bugtracker.net:2.5.8
cpe:/a:ifdefined:bugtracker.net:2.5.9
cpe:/a:ifdefined:bugtracker.net:2.6.0
cpe:/a:ifdefined:bugtracker.net:2.6.1
cpe:/a:ifdefined:bugtracker.net:2.6.2
cpe:/a:ifdefined:bugtracker.net:2.6.3
cpe:/a:ifdefined:bugtracker.net:2.6.4
cpe:/a:ifdefined:bugtracker.net:2.6.5
cpe:/a:ifdefined:bugtracker.net:2.6.6
cpe:/a:ifdefined:bugtracker.net:2.6.7
cpe:/a:ifdefined:bugtracker.net:2.6.8
cpe:/a:ifdefined:bugtracker.net:2.6.9
cpe:/a:ifdefined:bugtracker.net:2.7.0
cpe:/a:ifdefined:bugtracker.net:2.7.1
cpe:/a:ifdefined:bugtracker.net:2.7.2
cpe:/a:ifdefined:bugtracker.net:2.7.3
cpe:/a:ifdefined:bugtracker.net:2.7.4
cpe:/a:ifdefined:bugtracker.net:2.7.5
cpe:/a:ifdefined:bugtracker.net:2.7.6
cpe:/a:ifdefined:bugtracker.net:2.7.7
cpe:/a:ifdefined:bugtracker.net:2.7.8
cpe:/a:ifdefined:bugtracker.net:2.7.9
cpe:/a:ifdefined:bugtracker.net:2.8.0
cpe:/a:ifdefined:bugtracker.net:2.8.1
cpe:/a:ifdefined:bugtracker.net:2.8.2
cpe:/a:ifdefined:bugtracker.net:2.8.3
cpe:/a:ifdefined:bugtracker.net:2.8.4
cpe:/a:ifdefined:bugtracker.net:2.8.5
cpe:/a:ifdefined:bugtracker.net:2.8.6
cpe:/a:ifdefined:bugtracker.net:2.8.7
cpe:/a:ifdefined:bugtracker.net:2.8.8
cpe:/a:ifdefined:bugtracker.net:2.8.9
cpe:/a:ifdefined:bugtracker.net:2.9.0
cpe:/a:ifdefined:bugtracker.net:2.9.1
cpe:/a:ifdefined:bugtracker.net:2.9.2
cpe:/a:ifdefined:bugtracker.net:2.9.3
cpe:/a:ifdefined:bugtracker.net:2.9.4
cpe:/a:ifdefined:bugtracker.net:2.9.5
cpe:/a:ifdefined:bugtracker.net:2.9.6
cpe:/a:ifdefined:bugtracker.net:2.9.7
cpe:/a:ifdefined:bugtracker.net:2.9.8
cpe:/a:ifdefined:bugtracker.net:2.9.9
cpe:/a:ifdefined:bugtracker.net:3.0.0
cpe:/a:ifdefined:bugtracker.net:3.0.1
cpe:/a:ifdefined:bugtracker.net:3.0.3
cpe:/a:ifdefined:bugtracker.net:3.0.4
cpe:/a:ifdefined:bugtracker.net:3.0.5
cpe:/a:ifdefined:bugtracker.net:3.0.6
cpe:/a:ifdefined:bugtracker.net:3.0.7
cpe:/a:ifdefined:bugtracker.net:3.0.8
cpe:/a:ifdefined:bugtracker.net:3.0.9
cpe:/a:ifdefined:bugtracker.net:3.1.0
cpe:/a:ifdefined:bugtracker.net:3.1.1
cpe:/a:ifdefined:bugtracker.net:3.1.2
cpe:/a:ifdefined:bugtracker.net:3.1.3
cpe:/a:ifdefined:bugtracker.net:3.1.4
cpe:/a:ifdefined:bugtracker.net:3.1.5
cpe:/a:ifdefined:bugtracker.net:3.1.6
cpe:/a:ifdefined:bugtracker.net:3.1.7
cpe:/a:ifdefined:bugtracker.net:3.1.8
cpe:/a:ifdefined:bugtracker.net:3.1.9
cpe:/a:ifdefined:bugtracker.net:3.2.0
cpe:/a:ifdefined:bugtracker.net:3.3.9
cpe:/a:ifdefined:bugtracker.net:3.4.0
cpe:/a:ifdefined:bugtracker.net:3.4.1
cpe:/a:ifdefined:bugtracker.net:3.4.2
cpe:/a:ifdefined:bugtracker.net:3.4.3
cpe:/a:ifdefined:bugtracker.net:3.4.4 and previous versions
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
Medium [?]
X Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
X Single [?]
None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

Alternatives




References
CONFIRM http://btnet.svn.sourceforge.net/viewvc/btnet/RELEASE_NOTES.TXT?revision=578&view=markup




MISC http://www.coresecurity.com/content/multiple-vulnerabilities-in-bugtracker




SECUNIA 42418




Vulnerability Type SQL Injection (CWE-89)





Copyright © 2010 JPCERT/CC All Rights Reserved.