GreenSQL Firewall (greensql-fw), possibly before 0.9.2 or 0.9.4, allows remote attackers to bypass the SQL injection protection mechanism via a WHERE clause containing an expression such as "x=y=z", which is successfully parsed by MySQL.
References
| Link | Resource |
|---|---|
| http://bugs.mysql.com/bug.php?id=39337 | Exploit |
| http://osvdb.org/48910 | Exploit |
| http://sla.ckers.org/forum/read.php?16%2C24367 | |
| http://www.greensql.net/node/89 | Patch |
| http://www.greensql.net/node/98 | Patch |
| http://www.greensql.net/security | Vendor Advisory |
| http://bugs.mysql.com/bug.php?id=39337 | Exploit |
| http://osvdb.org/48910 | Exploit |
| http://sla.ckers.org/forum/read.php?16%2C24367 | |
| http://www.greensql.net/node/89 | Patch |
| http://www.greensql.net/node/98 | Patch |
| http://www.greensql.net/security | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://bugs.mysql.com/bug.php?id=39337 - Exploit | |
| References | () http://osvdb.org/48910 - Exploit | |
| References | () http://sla.ckers.org/forum/read.php?16%2C24367 - | |
| References | () http://www.greensql.net/node/89 - Patch | |
| References | () http://www.greensql.net/node/98 - Patch | |
| References | () http://www.greensql.net/security - Vendor Advisory |
07 Nov 2023, 02:03
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
Information
Published : 2009-08-19 05:24
Updated : 2025-04-09 00:30
NVD link : CVE-2008-6992
Mitre link : CVE-2008-6992
CVE.ORG link : CVE-2008-6992
JSON object : View
Products Affected
greensql
- greensql_firewall
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
