Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2012-0811 | First vendor Publication | 2014-10-01 |
Vendor | Cve | Last vendor Modification | 2014-10-02 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0811 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-10-03 | Name : Gentoo Security Advisory GLSA 201209-18 (postfixadmin) File : nvt/glsa_201209_18.nasl |
2012-02-12 | Name : FreeBSD Ports: postfixadmin File : nvt/freebsd_postfixadmin.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
78567 | Postfix Admin backup.php Unspecified SQL Injection Postfix Admin contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the backup.php script not properly sanitizing unspecified user-supplied input. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. |
78566 | Postfix Admin functions.inc.php pacrypt() Function Unspecified SQL Injection Postfix Admin contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the pacrypt() function in the functions.inc.php script not properly sanitizing unspecified user-supplied input. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. |
78565 | Postfix Admin create-domain.php Unspecified SQL Injection Postfix Admin contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the create-domain.php script not properly sanitizing unspecified user-supplied input. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-86.nasl - Type : ACT_GATHER_INFO |
2012-09-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201209-18.nasl - Type : ACT_GATHER_INFO |
2012-01-30 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_93688f8f493511e189b4001ec9578670.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-05-05 01:10:04 |
|
2021-05-04 12:19:18 |
|
2021-04-22 01:23:02 |
|
2020-05-23 01:48:12 |
|
2020-05-23 00:32:59 |
|
2016-04-26 21:33:22 |
|
2014-10-02 21:25:24 |
|
2014-10-01 21:24:52 |
|