Vulnerability Details : CVE-2008-5055
SQL injection vulnerability in department_offline_context.php in ActiveCampaign TrioLive before 1.58.7 allows remote attackers to execute arbitrary SQL commands via the department_id parameter to index.php.
Vulnerability category: Sql Injection
Products affected by CVE-2008-5055
- cpe:2.3:a:activecampaign:triolive:*:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.58.0:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.57:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.55.0:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.50.6:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.41:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.40:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.32:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.31:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.23:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.22:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.15:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.14:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.07:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.06:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.05:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.58.4:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.58.3:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.56.3:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.56.2:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.56.1:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.50.3:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.50.2:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.36:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.35:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.27:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.26:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.19:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.18:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.11:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.10:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:unknown:beta5:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.58.2:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.58.1:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.55.2:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.55.1:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.50.1:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.42:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.34:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.33:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.25:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.24:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.17:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.16:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.09:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.08:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:unknown:beta3:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:unknown:beta2:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.58.5:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.56.5:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.56.4:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.50.5:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.50.4:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.39:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.37:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.30:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.29:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.28:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.21:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.20:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.13:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.12:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.04:*:*:*:*:*:*:*
- cpe:2.3:a:activecampaign:triolive:1.03:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-5055
0.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-5055
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-5055
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-5055
Jump to