CVE-2011-0432

Multiple SQL injection vulnerabilities in the get_userinfo method in the MySQLAuthHandler class in DAVServer/mysqlauth.py in PyWebDAV before 0.9.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) user or (2) pw argument.  NOTE: some of these details are obtained from third party information.
SQL Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 76%
VendorProductVersion
simon_pamiespywebdav
𝑥
≤ 0.9.4
simon_pamiespywebdav
0.3
simon_pamiespywebdav
0.5
simon_pamiespywebdav
0.5.1
simon_pamiespywebdav
0.6
simon_pamiespywebdav
0.7
simon_pamiespywebdav
0.8
simon_pamiespywebdav
0.9.1
simon_pamiespywebdav
0.9.2
simon_pamiespywebdav
0.9.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pywebdav
bookworm
0.9.14-1
fixed
bullseye
0.9.14-1
fixed
sid
0.11.0-1
fixed
trixie
0.11.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pywebdav
saucy
not-affected
raring
not-affected
quantal
not-affected
precise
not-affected
oneiric
not-affected
natty
not-affected
maverick
Fixed 0.9.4-1+squeeze1build0.10.10.1
released
lucid
ignored
karmic
ignored
hardy
dne
dapper
dne