First published: Fri Mar 19 2010(Updated: )
SQL injection vulnerability in the Diocese of Portsmouth Database (pd_diocesedatabase) extension before 0.7.13 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
fr.simon rundell pd diocesedatabase | <=0.7.12 | |
fr.simon rundell pd diocesedatabase | =0.7.5 | |
fr.simon rundell pd diocesedatabase | =0.7.6 | |
fr.simon rundell pd diocesedatabase | =0.7.8 | |
fr.simon rundell pd diocesedatabase | =0.7.9 | |
TYPO3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1013 has been classified as a critical severity vulnerability due to the potential for remote SQL injection attacks.
To fix CVE-2010-1013, upgrade the Diocese of Portsmouth Database extension to version 0.7.13 or later.
CVE-2010-1013 affects versions of the Diocese of Portsmouth Database extension before 0.7.13, including versions 0.7.5 to 0.7.12.
Yes, CVE-2010-1013 can allow attackers to execute arbitrary SQL commands, potentially leading to data compromise.
No, TYPO3 itself is not affected by CVE-2010-1013, only the Diocese of Portsmouth Database extension.