Vulnerability Details : CVE-2013-10019
A vulnerability was found in OCLC-Research OAICat 1.5.61. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. Upgrading to version 1.5.62 is able to address this issue. The identifier of the patch is 6cc65501869fa663bcd24a70b63f41f5cfe6b3e1. It is recommended to upgrade the affected component. The identifier VDB-221489 was assigned to this vulnerability.
Vulnerability category: Sql Injection
Products affected by CVE-2013-10019
- cpe:2.3:a:oclc:oaicat:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-10019
0.21%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 59 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-10019
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
VulDB | |
6.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
VulDB | |
6.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
VulDB | 2024-02-29 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2013-10019
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.Assigned by: cna@vuldb.com (Primary)
References for CVE-2013-10019
-
https://github.com/OCLC-Research/oaicat/commit/6cc65501869fa663bcd24a70b63f41f5cfe6b3e1
Added a AbstractCatalog.paramRegex property to address an SQL injecti… · OCLC-Research/oaicat@6cc6550 · GitHubPatch
-
https://vuldb.com/?ctiid.221489
Login requiredPermissions Required;Third Party Advisory
-
https://oaicat.googlecode.com/files/oaicat-1.5.62.tar.gz
Error 404 (Not Found)!!1Release Notes
-
https://code.google.com/archive/p/oaicat/issues/7
Google Code Archive - Long-term storage for Google Code Project Hosting.Issue Tracking;Vendor Advisory
-
https://vuldb.com/?id.221489
Login requiredThird Party Advisory
Jump to