SQL injection vulnerability in the loginUser function in the XMLRPC server in XOOPS 2.0.11 and earlier allows remote attackers to execute arbitrary SQL commands and bypass authentication via crafted values in an XML file, as demonstrated using the blogger.getPost method.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xoops | Xoops | 2.0 (including) | 2.0 (including) |
Xoops | Xoops | 2.0.1 (including) | 2.0.1 (including) |
Xoops | Xoops | 2.0.2 (including) | 2.0.2 (including) |
Xoops | Xoops | 2.0.3 (including) | 2.0.3 (including) |
Xoops | Xoops | 2.0.4 (including) | 2.0.4 (including) |
Xoops | Xoops | 2.0.5 (including) | 2.0.5 (including) |
Xoops | Xoops | 2.0.5.1 (including) | 2.0.5.1 (including) |
Xoops | Xoops | 2.0.5.2 (including) | 2.0.5.2 (including) |
Xoops | Xoops | 2.0.6 (including) | 2.0.6 (including) |
Xoops | Xoops | 2.0.7 (including) | 2.0.7 (including) |
Xoops | Xoops | 2.0.9 (including) | 2.0.9 (including) |
Xoops | Xoops | 2.0.9.2 (including) | 2.0.9.2 (including) |
Xoops | Xoops | 2.0.9.3 (including) | 2.0.9.3 (including) |
Xoops | Xoops | 2.0.10 (including) | 2.0.10 (including) |
Xoops | Xoops | 2.0.11 (including) | 2.0.11 (including) |