SQL injection vulnerability in the API in Cybozu Garoon 3.7.x before 3.7.3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2013-6929.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://cs.cybozu.co.jp/information/20140127up03.php | vendor advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000010 | third party advisory |
http://jvn.jp/en/jp/JVN91153528/index.html | third party advisory |
http://jvn.jp/en/jp/JVN91153528/374951/index.html | |
https://support.cybozu.com/ja-jp/article/7888 | vendor advisory |