First published: Tue Apr 19 2011(Updated: )
Multiple SQL injection vulnerabilities in WEC Discussion Forum (wec_discussion) extension 2.1.0 and earlier for TYPO3 allow remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in April 2011.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TYPO3 WEC Discussion Forum | <=2.1.0 | |
TYPO3 WEC Discussion Forum | =1.6.0 | |
TYPO3 WEC Discussion Forum | =1.6.1 | |
TYPO3 WEC Discussion Forum | =1.6.2 | |
TYPO3 WEC Discussion Forum | =1.6.3 | |
TYPO3 WEC Discussion Forum | =1.7.0 | |
TYPO3 WEC Discussion Forum | =2.0.1 | |
TYPO3 WEC Discussion Forum | =2.0.2 | |
TYPO3 WEC Discussion Forum | =2.0.3 | |
TYPO3 WEC Discussion Forum | =2.0.4 | |
TYPO3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1722 has a medium severity level due to its potential for remote SQL injection, allowing attackers to execute arbitrary SQL commands.
To fix CVE-2011-1722, upgrade the WEC Discussion Forum extension to version 2.1.1 or later.
CVE-2011-1722 affects WEC Discussion Forum extension versions 2.1.0 and earlier, as well as versions 1.6.0 to 1.7.0.
Yes, CVE-2011-1722 can be exploited remotely, allowing attackers to utilize SQL injection vulnerabilities.
Yes, there is evidence that CVE-2011-1722 was actively exploited in the wild in April 2011.