{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2014-125053","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-06T22:43:39.782Z","datePublished":"2023-01-06T22:44:35.942Z","dateUpdated":"2024-08-06T14:10:56.754Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T06:19:06.933Z"},"title":"Piwigo-Guest-Book Navigation Bar guestbook.inc.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"Piwigo-Guest-Book","versions":[{"version":"1.0","status":"affected"},{"version":"1.1","status":"affected"},{"version":"1.2","status":"affected"},{"version":"1.3","status":"affected"}],"modules":["Navigation Bar"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Piwigo-Guest-Book up to 1.3.0. It has been declared as critical. This vulnerability affects unknown code of the file include/guestbook.inc.php of the component Navigation Bar. The manipulation of the argument start leads to sql injection. Upgrading to version 1.3.1 is able to address this issue. The patch is identified as 0cdd1c388edf15089c3a7541cefe7756e560581d. It is recommended to upgrade the affected component. VDB-217582 is the identifier assigned to this vulnerability."},{"lang":"de","value":"In Piwigo-Guest-Book bis 1.3.0 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei include/guestbook.inc.php der Komponente Navigation Bar. Mit der Manipulation des Arguments start mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 1.3.1 vermag dieses Problem zu lösen. Der Patch wird als 0cdd1c388edf15089c3a7541cefe7756e560581d bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.2,"vectorString":"AV:A/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-01-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-06T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-01-29T14:31:45.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.217582","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.217582","tags":["signature","permissions-required"]},{"url":"https://github.com/Piwigo/Piwigo-Guest-Book/commit/0cdd1c388edf15089c3a7541cefe7756e560581d","tags":["patch"]},{"url":"https://github.com/Piwigo/Piwigo-Guest-Book/releases/tag/1.3.1","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T14:10:56.754Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.217582","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.217582","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/Piwigo/Piwigo-Guest-Book/commit/0cdd1c388edf15089c3a7541cefe7756e560581d","tags":["patch","x_transferred"]},{"url":"https://github.com/Piwigo/Piwigo-Guest-Book/releases/tag/1.3.1","tags":["patch","x_transferred"]}]}]}}