First published: Wed Sep 19 2012(Updated: )
SQL injection vulnerability in admin/admin.php in LimeSurvey before 1.91+ Build 120224 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a browse action. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LimeSurvey | <=1.91\+ | |
LimeSurvey | =1.01 | |
LimeSurvey | =1.50 | |
LimeSurvey | =1.52 | |
LimeSurvey | =1.53\+ | |
LimeSurvey | =1.70\+ | |
LimeSurvey | =1.71\+ | |
LimeSurvey | =1.72 | |
LimeSurvey | =1.80\+ | |
LimeSurvey | =1.81\+ | |
LimeSurvey | =1.82\+ | |
LimeSurvey | =1.85 | |
LimeSurvey | =1.86 | |
LimeSurvey | =1.87\+ | |
LimeSurvey | =1.90\+ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4994 is typically classified as a medium severity vulnerability due to its potential for SQL injection, which can lead to unauthorized data access.
To fix CVE-2012-4994, you should upgrade to LimeSurvey version 1.91+ Build 120224 or later, which includes a patch against this vulnerability.
CVE-2012-4994 affects remote authenticated users of LimeSurvey versions prior to 1.91+ Build 120224.
CVE-2012-4994 is an SQL injection vulnerability that allows execution of arbitrary SQL commands via a vulnerable parameter.
An attacker exploiting CVE-2012-4994 could potentially gain unauthorized access to the database, manipulate data, or execute administrative functions.