The Quick Search API in CiviCRM 4.2.0 through 4.2.9 and 4.3.0 through 4.3.3 allows remote authenticated users to bypass the validation layer and conduct SQL injection attacks via a direct request to the "second layer" of the API, related to contact.getquick.
References
Link | Resource |
---|---|
http://issues.civicrm.org/jira/browse/CRM-12765 | Vendor Advisory |
https://civicrm.org/advisory/civi-sa-2013-004-limited-sql-injection-quick-search-api | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-01-29 10:55
Updated : 2014-02-21 11:29
NVD link : CVE-2013-4662
Mitre link : CVE-2013-4662
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
civicrm
- civicrm