SQL injection vulnerability in includes/api/4/breadcrumbs_create.php in vBulletin 4.2.2, 4.2.1, 4.2.0 PL2, and earlier allows remote authenticated users to execute arbitrary SQL commands via the conceptid argument in an xmlrpc API request.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:05
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/128696/vBulletin-4.x-SQL-Injection.html - Exploit | |
| References | () http://seclists.org/fulldisclosure/2014/Oct/56 - Exploit | |
| References | () http://www.securityfocus.com/bid/70417 - | |
| References | () http://www.securitytracker.com/id/1031001 - | |
| References | () https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2022 - Exploit | 
Information
                Published : 2014-10-15 14:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-2022
Mitre link : CVE-2014-2022
CVE.ORG link : CVE-2014-2022
JSON object : View
Products Affected
                vbulletin
- vbulletin
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
