Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-4970

EPSS 0.60% · P70
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-4970

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple SQL injection vulnerabilities in LCG Disk Pool Manager (DPM) before 1.8.6, as used in EGI UDM, allow remote attackers to execute arbitrary SQL commands via the (1) r_token variable in the dpm_get_pending_req_by_token, (2) dpm_get_cpr_by_fullid, (3) dpm_get_cpr_by_surl, (4) dpm_get_cpr_by_surls, (5) dpm_get_gfr_by_fullid, (6) dpm_get_gfr_by_surl, (7) dpm_get_pfr_by_fullid, (8) dpm_get_pfr_by_surl, (9) dpm_get_req_by_token, (10) dpm_insert_cpr_entry, (11) dpm_insert_gfr_entry, (12) dpm_insert_pending_entry, (13) dpm_insert_pfr_entry, (14) dpm_insert_xferreq_entry, (15) dpm_list_cpr_entry, (16) dpm_list_gfr_entry, or (17) dpm_list_pfr_entry function; the (18) surl variable in the dpm_get_cpr_by_surl function; the (19) to_surl variable in the dpm_get_cpr_by_surls function; the (20) u_token variable in the dpm_get_pending_reqs_by_u_desc, (21) dpm_get_reqs_by_u_desc, (22) dpm_get_spcmd_by_u_desc, (23) dpm_insert_pending_entry, (24) dpm_insert_spcmd_entry, or (25) dpm_insert_xferreq_entry function; the (26) s_token variable in the dpm_get_spcmd_by_token, (27) dpm_insert_cpr_entry, (28) dpm_insert_gfr_entry, (29) dpm_insert_pfr_entry, (30) dpm_insert_spcmd_entry, (31) dpm_update_cpr_entry, (32) dpm_update_gfr_entry, or (33) dpm_update_pfr_entry function; or remote administrators to execute arbitrary SQL commands via the (34) poolname variable in the dpm_get_pool_entry, (35) dpm_insert_fs_entry, (36) dpm_insert_pool_entry, (37) dpm_insert_spcmd_entry, (38) dpm_list_fs_entry, or (39) dpm_update_spcmd_entry function.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
LCG Disk Pool Manager SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
LCG Disk Pool Manager(DPM)是一套磁盘存储管理解决方案。该方案支持为文件分配必要地存储空间、合理地组织文件的存取方式和提高对文件的访问速度等。 EGI UDM使用的LCG DPM 1.8.6之前的版本中存在多个SQL注入漏洞。远程攻击者可利用该漏洞执行任意SQL命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2011-4970

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-4970

Please Login to view more intelligence information

Same Patch Batch · n/a · 2014-05-13 · 17 CVEs total

CVE-2013-4490GitLab gitlab-shell ‘SSH key upload’功能远程代码执行漏洞
CVE-2013-4500Drupal Quiz模块访问绕过漏洞
CVE-2013-4501Drupal Quiz模块访问绕过漏洞
CVE-2013-4502Drupal FileField Sources模块访问绕过漏洞
CVE-2013-4503Drupal Feed Element Mapper模块跨站脚本漏洞
CVE-2013-4504Drupal Monster Menus模块访问绕过漏洞
CVE-2013-4546GitLab gitlab-shell Repository Import Feature 远程代码执行漏洞
CVE-2013-4552SimpleSAMLphp drupalauth模块身份验证绕过漏洞
CVE-2013-4562RubyGems omniauth-facebook 跨站请求伪造漏洞
CVE-2014-3456GitLab Enterprise Edition 跨站脚本漏洞
CVE-2012-6342Atlassian Confluence 跨站请求伪造漏洞
CVE-2013-1407WordPress Events Manager插件跨站脚本漏洞
CVE-2013-2692OpenVPN Access Server 跨站请求伪造漏洞
CVE-2013-2705WordPress Simple Paypal Shopping Cart插件跨站请求伪造漏洞
CVE-2014-2989Open Assessment Technologies TAO 跨站请求伪造漏洞
CVE-2014-3246Collabtive SQL注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2011-4970

No comments yet


Leave a comment