{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2014-125084","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-02-04T22:07:56.465Z","datePublished":"2023-02-05T23:57:03.158Z","dateUpdated":"2024-08-06T14:10:56.667Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T06:55:43.926Z"},"title":"Gimmie Plugin trigger_referral.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"Gimmie Plugin","versions":[{"version":"1.2.2","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, has been found in Gimmie Plugin 1.2.2 on vBulletin. This issue affects some unknown processing of the file trigger_referral.php. The manipulation of the argument referrername leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The identifier of the patch is 7194a09353dd24a274678383a4418f2fd3fce6f7. It is recommended to upgrade the affected component. The identifier VDB-220205 was assigned to this vulnerability."},{"lang":"de","value":"Eine Schwachstelle wurde in Gimmie Plugin 1.2.2 für vBulletin entdeckt. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Datei trigger_referral.php. Durch das Manipulieren des Arguments referrername mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 1.3.0 vermag dieses Problem zu lösen. Der Patch wird als 7194a09353dd24a274678383a4418f2fd3fce6f7 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.2,"vectorString":"AV:A/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-02-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-02-04T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-02-04T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-03-05T08:48:27.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.220205","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.220205","tags":["signature","permissions-required"]},{"url":"https://github.com/gimmie/vbulletin-v4/commit/7194a09353dd24a274678383a4418f2fd3fce6f7","tags":["patch"]},{"url":"https://github.com/gimmie/vbulletin-v4/tree/v1.3.0","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T14:10:56.667Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.220205","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.220205","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/gimmie/vbulletin-v4/commit/7194a09353dd24a274678383a4418f2fd3fce6f7","tags":["patch","x_transferred"]},{"url":"https://github.com/gimmie/vbulletin-v4/tree/v1.3.0","tags":["patch","x_transferred"]}]}]}}