CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
73.5%
Multiple SQL injection vulnerabilities in the get_userinfo method in the MySQLAuthHandler class in DAVServer/mysqlauth.py in PyWebDAV before 0.9.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) user or (2) pw argument. NOTE: some of these details are obtained from third party information.
Vendor | Product | Version | CPE |
---|---|---|---|
simon_pamies | pywebdav | * | cpe:2.3:a:simon_pamies:pywebdav:*:*:*:*:*:*:*:* |
simon_pamies | pywebdav | 0.3 | cpe:2.3:a:simon_pamies:pywebdav:0.3:*:*:*:*:*:*:* |
simon_pamies | pywebdav | 0.5 | cpe:2.3:a:simon_pamies:pywebdav:0.5:*:*:*:*:*:*:* |
simon_pamies | pywebdav | 0.5.1 | cpe:2.3:a:simon_pamies:pywebdav:0.5.1:*:*:*:*:*:*:* |
simon_pamies | pywebdav | 0.6 | cpe:2.3:a:simon_pamies:pywebdav:0.6:*:*:*:*:*:*:* |
simon_pamies | pywebdav | 0.7 | cpe:2.3:a:simon_pamies:pywebdav:0.7:*:*:*:*:*:*:* |
simon_pamies | pywebdav | 0.8 | cpe:2.3:a:simon_pamies:pywebdav:0.8:*:*:*:*:*:*:* |
simon_pamies | pywebdav | 0.9.1 | cpe:2.3:a:simon_pamies:pywebdav:0.9.1:*:*:*:*:*:*:* |
simon_pamies | pywebdav | 0.9.2 | cpe:2.3:a:simon_pamies:pywebdav:0.9.2:*:*:*:*:*:*:* |
simon_pamies | pywebdav | 0.9.3 | cpe:2.3:a:simon_pamies:pywebdav:0.9.3:*:*:*:*:*:*:* |
code.google.com/p/pywebdav/updates/list
lists.fedoraproject.org/pipermail/package-announce/2011-March/055412.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/055413.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/055444.html
pywebdav.googlecode.com/files/PyWebDAV-0.9.4.1.tar.gz
secunia.com/advisories/43571
secunia.com/advisories/43602
secunia.com/advisories/43703
www.debian.org/security/2011/dsa-2177
www.securityfocus.com/bid/46655
www.vupen.com/english/advisories/2011/0553
www.vupen.com/english/advisories/2011/0554
www.vupen.com/english/advisories/2011/0634
bugzilla.redhat.com/show_bug.cgi?id=677718