Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.8:-:lts:*:*:*:*:*", "matchCriteriaId": "673A659F-B843-480D-83AB-C762A14A9CE2", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.9:-:lts:*:*:*:*:*", "matchCriteriaId": "120FCD3A-F2B6-4FA4-813D-86582005AF0E", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.10:-:lts:*:*:*:*:*", "matchCriteriaId": "D95B1ADB-A1B7-487C-9F16-EE59ADFDE2F8", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.11:-:lts:*:*:*:*:*", "matchCriteriaId": "DBFB9525-CF5A-4E68-A7C9-7E3E41926AA0", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.12:-:lts:*:*:*:*:*", "matchCriteriaId": "8E51032C-F31F-4164-980D-6D5D3794F92B", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.0:-:lts:*:*:*:*:*", "matchCriteriaId": "68224364-8C2A-49EA-9699-DC25D442C740", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.0:alpha:lts:*:*:*:*:*", "matchCriteriaId": "A61EF962-848E-40BA-B91A-00118760E4AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.0:beta:lts:*:*:*:*:*", "matchCriteriaId": "3ED7B1F4-35AF-4620-A000-63010838C253", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.0:beta2:lts:*:*:*:*:*", "matchCriteriaId": "1061E898-85F8-40DC-83A1-978B22EBDE3A", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.1:-:lts:*:*:*:*:*", "matchCriteriaId": "36855536-80A2-4DA3-A1F1-294534D3CBB1", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.2:-:lts:*:*:*:*:*", "matchCriteriaId": "41241234-0D3B-4A21-8DDE-DF13531737DB", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.2:beta1:lts:*:*:*:*:*", "matchCriteriaId": "757E5585-B4CD-4B72-86D7-C3ED1E4210F9", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.3:-:lts:*:*:*:*:*", "matchCriteriaId": "968103DF-4FED-4B79-9470-85D0EFF46C26", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.4:-:lts:*:*:*:*:*", "matchCriteriaId": "A17C32D6-3AD0-47B9-A535-F45AF36DBB77", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.5:-:lts:*:*:*:*:*", "matchCriteriaId": "D0E5E8F4-4BEE-44BC-8DCC-CC0C8E7B7D9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:9.6:-:lts:*:*:*:*:*", "matchCriteriaId": "9FA3D2C3-0787-48BB-BD2C-90082B56E399", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "26BC8370-486A-4CDD-89FA-0A154DAA4350", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "111106F2-2985-4E57-A136-59FC0685F553", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.0:beta:*:*:*:*:*:*", "matchCriteriaId": "41F4F831-07B8-4750-9C99-6FDE291E2106", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "996A3D2F-80FA-4D92-B990-E39A90107E42", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.2:*:*:*:*:*:*:*", "matchCriteriaId": "959E9B5C-9D7C-4EAD-8FE6-1D8B165BBEBB", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB0B836D-5D99-48FF-A099-A39FFFD79507", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "30D43901-AC30-4EE7-9E60-374EAB7A70E8", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:11.0:beta:*:*:*:*:*:*", "matchCriteriaId": "DFCBEC25-6DA1-47E7-803E-199117BC6987", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in Tiki Wiki CMS Groupware 6 LTS before 6.13LTS, 9 LTS before 9.7LTS, 10.x before 10.4, and 11.x before 11.1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en Tiki Wiki CMS Groupware 6 LTS anterior a 6.13LTS, 9 LTS anterior 9.7LTS, 10.x anterior a 10.4, 11.x anterior a 11.1 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de vectores no especificados."}], "id": "CVE-2013-4715", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-11-06T15:55:06.453", "references": [{"source": "vultures@jpcert.or.jp", "url": "http://info.tiki.org/article221-New-Versions-of-all-supported-versions-of-Tiki-Wiki-CMS-Groupware"}, {"source": "vultures@jpcert.or.jp", "url": "http://jvn.jp/en/jp/JVN75720314/index.html"}, {"source": "vultures@jpcert.or.jp", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000100"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://info.tiki.org/article221-New-Versions-of-all-supported-versions-of-Tiki-Wiki-CMS-Groupware"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN75720314/index.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000100"}], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-89"}], "source": "nvd@nist.gov", "type": "Primary"}]}