First published: Fri Mar 14 2014(Updated: )
SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
lighttpd | <1.4.35 | |
Debian GNU/Linux | =6.0 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
openSUSE | =11.4 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise High Availability | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2323 is classified as a high severity vulnerability due to the potential for arbitrary SQL command execution.
To fix CVE-2014-2323, upgrade to lighttpd version 1.4.35 or later.
CVE-2014-2323 affects lighttpd versions prior to 1.4.35 and certain Debian and openSUSE distributions.
Yes, due to the SQL injection nature of CVE-2014-2323, it can potentially lead to data breaches and unauthorized access to sensitive information.
No, while CVE-2014-2323 is a notable SQL injection vulnerability, there may be other vulnerabilities that also pose risks.