First published: Tue Feb 11 2014(Updated: )
Multiple SQL injection vulnerabilities in AuraCMS 2.3 and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) search parameter to mod/content/content.php or (2) CLIENT_IP, (3) X_FORWARDED_FOR, (4) X_FORWARDED, (5) FORWARDED_FOR, or (6) FORWARDED HTTP header to index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tina Tinacms | <=2.3 | |
Tina Tinacms | =1.0 | |
Tina Tinacms | =1.1 | |
Tina Tinacms | =1.2 | |
Tina Tinacms | =1.3 | |
Tina Tinacms | =1.5 | |
Tina Tinacms | =1.61 | |
Tina Tinacms | =1.62 | |
Tina Tinacms | =2.0 | |
Tina Tinacms | =2.1 | |
Tina Tinacms | =2.2 | |
Tina Tinacms | =2.2.1 | |
Tina Tinacms | =2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-1401 is considered to be high due to its ability to allow remote authenticated users to execute arbitrary SQL commands.
To fix CVE-2014-1401, upgrade your AuraCMS to version 2.4 or later to mitigate the SQL injection vulnerabilities.
CVE-2014-1401 affects AuraCMS versions 2.3 and earlier, including multiple earlier versions like 1.0 to 2.2.2.
CVE-2014-1401 includes multiple SQL injection vulnerabilities through parameters such as 'search' and various HTTP headers.
Yes, CVE-2014-1401 can be exploited remotely by authenticated users, allowing unauthorized SQL command execution.