First published: Fri Sep 28 2012(Updated: )
Multiple SQL injection vulnerabilities in the get_sample_filters_by_signature function in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to execute arbitrary SQL commands via the (1) agent or (2) object id.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trevor McKay Cumin | <=0.1.5192-4 | |
Trevor McKay Cumin | =0.1.3160-1 | |
Trevor McKay Cumin | =0.1.4369-1 | |
Trevor McKay Cumin | =0.1.4410-2 | |
Trevor McKay Cumin | =0.1.4494-1 | |
Trevor McKay Cumin | =0.1.4794-1 | |
Trevor McKay Cumin | =0.1.4916-1 | |
Trevor McKay Cumin | =0.1.5033-1 | |
Trevor McKay Cumin | =0.1.5037-1 | |
Trevor McKay Cumin | =0.1.5054-1 | |
Trevor McKay Cumin | =0.1.5068-1 | |
Trevor McKay Cumin | =0.1.5092-1 | |
Trevor McKay Cumin | =0.1.5098-2 | |
Trevor McKay Cumin | =0.1.5105-1 | |
Trevor McKay Cumin | =0.1.5137-1 | |
Trevor McKay Cumin | =0.1.5137-2 | |
Trevor McKay Cumin | =0.1.5137-3 | |
Trevor McKay Cumin | =0.1.5137-4 | |
Trevor McKay Cumin | =0.1.5137-5 | |
Trevor McKay Cumin | =0.1.5192-1 | |
Red Hat Enterprise MRG | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2684 is classified as a medium severity vulnerability due to the potential for arbitrary SQL command execution.
To fix CVE-2012-2684, upgrade to Cumin version 0.1.5444 or later.
CVE-2012-2684 allows remote attackers to execute arbitrary SQL commands, which can lead to data breaches or system compromise.
CVE-2012-2684 affects Cumin versions up to 0.1.5444, including several releases such as 0.1.5192-4 and earlier.
Yes, CVE-2012-2684 has the potential for exploitation by attackers, but specific exploits have not been publicly documented.