Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2013-11-24T00:00:00", "descriptions": [{"lang": "en", "value": "Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://github.com/quassel/quassel/commit/a1a24da"}, {"name": "openSUSE-SU-2013:1929", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html"}, {"name": "[oss-security] 20131127 Re: CVE Request: Quassel IRC - manipulated clients can access backlog of all users on a shared core", "tags": ["mailing-list", "x_refsource_MLIST"], "url": "http://www.openwall.com/lists/oss-security/2013/11/28/8"}, {"tags": ["x_refsource_CONFIRM"], "url": "http://quassel-irc.org/node/123"}, {"name": "quasselirc-cve20136404-sec-bypass(89377)", "tags": ["vdb-entry", "x_refsource_XF"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89377"}, {"name": "55640", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/55640"}, {"name": "openSUSE-SU-2014:0114", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html"}, {"name": "100432", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://osvdb.org/100432"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6404", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "https://github.com/quassel/quassel/commit/a1a24da", "refsource": "CONFIRM", "url": "https://github.com/quassel/quassel/commit/a1a24da"}, {"name": "openSUSE-SU-2013:1929", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html"}, {"name": "[oss-security] 20131127 Re: CVE Request: Quassel IRC - manipulated clients can access backlog of all users on a shared core", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/11/28/8"}, {"name": "http://quassel-irc.org/node/123", "refsource": "CONFIRM", "url": "http://quassel-irc.org/node/123"}, {"name": "quasselirc-cve20136404-sec-bypass(89377)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89377"}, {"name": "55640", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55640"}, {"name": "openSUSE-SU-2014:0114", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html"}, {"name": "100432", "refsource": "OSVDB", "url": "http://osvdb.org/100432"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-06T17:39:01.300Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://github.com/quassel/quassel/commit/a1a24da"}, {"name": "openSUSE-SU-2013:1929", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html"}, {"name": "[oss-security] 20131127 Re: CVE Request: Quassel IRC - manipulated clients can access backlog of all users on a shared core", "tags": ["mailing-list", "x_refsource_MLIST", "x_transferred"], "url": "http://www.openwall.com/lists/oss-security/2013/11/28/8"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "http://quassel-irc.org/node/123"}, {"name": "quasselirc-cve20136404-sec-bypass(89377)", "tags": ["vdb-entry", "x_refsource_XF", "x_transferred"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89377"}, {"name": "55640", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/55640"}, {"name": "openSUSE-SU-2014:0114", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html"}, {"name": "100432", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://osvdb.org/100432"}]}]}, "cveMetadata": {"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6404", "datePublished": "2013-12-09T11:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.300Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}