{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2014-125051","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-06T16:19:41.734Z","datePublished":"2023-01-06T16:20:47.017Z","dateUpdated":"2024-08-06T14:10:56.582Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T06:16:40.514Z"},"title":"himiklab yii2-jqgrid-widget JqGridAction.php addSearchOptionsRecursively sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"himiklab","product":"yii2-jqgrid-widget","versions":[{"version":"1.0.0","status":"affected"},{"version":"1.0.1","status":"affected"},{"version":"1.0.2","status":"affected"},{"version":"1.0.3","status":"affected"},{"version":"1.0.4","status":"affected"},{"version":"1.0.5","status":"affected"},{"version":"1.0.6","status":"affected"},{"version":"1.0.7","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in himiklab yii2-jqgrid-widget up to 1.0.7. It has been declared as critical. This vulnerability affects the function addSearchOptionsRecursively of the file JqGridAction.php. The manipulation leads to sql injection. Upgrading to version 1.0.8 is able to address this issue. The name of the patch is a117e0f2df729e3ff726968794d9a5ac40e660b9. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217564."},{"lang":"de","value":"In himiklab yii2-jqgrid-widget bis 1.0.7 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Hierbei betrifft es die Funktion addSearchOptionsRecursively der Datei JqGridAction.php. Mittels Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 1.0.8 vermag dieses Problem zu lösen. Der Patch wird als a117e0f2df729e3ff726968794d9a5ac40e660b9 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.2,"vectorString":"AV:A/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-01-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-06T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-01-29T13:07:52.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.217564","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.217564","tags":["signature","permissions-required"]},{"url":"https://github.com/himiklab/yii2-jqgrid-widget/commit/a117e0f2df729e3ff726968794d9a5ac40e660b9","tags":["patch"]},{"url":"https://github.com/himiklab/yii2-jqgrid-widget/releases/tag/1.0.8","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T14:10:56.582Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.217564","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.217564","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/himiklab/yii2-jqgrid-widget/commit/a117e0f2df729e3ff726968794d9a5ac40e660b9","tags":["patch","x_transferred"]},{"url":"https://github.com/himiklab/yii2-jqgrid-widget/releases/tag/1.0.8","tags":["patch","x_transferred"]}]}]}}