Published:2012/06/01 Last Updated:2012/06/01
JVN#97995841
Segue vulnerable to SQL injection
Overview
Segue contains a SQL injection vulnerability.
Products Affected
- Segue
Description
Segue is a content management system. Segue contains a SQL injection vulnerability.
Impact
A remote, unauthenticated attacker may bypass authentication and login as an administrator.
Solution
Do not use Segue
Segue services will no longer be available after August 31, 2012.
Refer to the information provided by the developer for data migration.
Vendor Status
Vendor | Link |
Segue Project | Segue Project Page |
Migrate from Segue |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2012.06.01
Measures | Conditions | Severity |
---|---|---|
Access Required | can be attacked over the Internet using packets |
|
Authentication | anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | the vulnerability can be exploited without an honest user taking any action |
|
Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Daiki Fukumori of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2012-1255 |
JVN iPedia |
JVNDB-2012-000053 |