CVE-2008-5798 - SQL Injection vulnerability in Typo3 CMS Poll System Extension 0.1.0

Publication

2008-12-31

Last modification

2017-08-08

Summary

SQL injection vulnerability in the CMS Poll system (cms_poll) extension before 0.1.1 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

Description

TYPO3 CMS Poll system ('cms_poll') extension is prone to an unspecified SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Versions prior to cms_poll 0.1.1 are vulnerable.

Solution

The vendor released an update and an advisory. Please see the references for more information. Typo3 CMS Poll system 0.1 Typo3 cms_poll_0.1.1.t3x http://typo3.org/fileadmin/ter/c/m/cms_poll_0.1.1.t3x

Exploit

Attackers can use a browser to exploit this issue.

Classification

CWE-89 - SQL Injection

Risk level (CVSS AV:N/AC:L/Au:N/C:P/I:P/A:P)

High

7.5

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

Vendor Product Versions
Typo3 CMS Poll System Extension  0.1.0