The Quick Search API in CiviCRM 4.2.0 through 4.2.9 and 4.3.0 through 4.3.3 allows remote authenticated users to bypass the validation layer and conduct SQL injection attacks via a direct request to the "second layer" of the API, related to contact.getquick.
References
Link | Resource |
---|---|
http://issues.civicrm.org/jira/browse/CRM-12765 | Vendor Advisory |
https://civicrm.org/advisory/civi-sa-2013-004-limited-sql-injection-quick-search-api | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2014-01-29T18:00:00
Updated: 2014-01-29T17:57:00
Reserved: 2013-06-24T00:00:00
Link: CVE-2013-4662
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-01-29T18:55:26.637
Modified: 2014-02-21T19:29:06.233
Link: CVE-2013-4662
JSON object: View
Redhat Information
No data.
CWE