Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:arubanetworks:clearpass:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EF7324FA-8041-4C79-B630-5912E0AC6880", "vulnerable": true}, {"criteria": "cpe:2.3:a:arubanetworks:clearpass:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD0B9F17-CC52-497E-B492-73DFBF6203C0", "vulnerable": true}, {"criteria": "cpe:2.3:a:arubanetworks:clearpass:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "584703D0-5E85-4BDA-A670-6BECF3A71BB7", "vulnerable": true}, {"criteria": "cpe:2.3:a:arubanetworks:clearpass:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FFFA1B8-1B2B-4DE1-8469-FFEDC9ECF34C", "vulnerable": true}, {"criteria": "cpe:2.3:a:arubanetworks:clearpass:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D10617AC-F939-4CA1-AD63-C192125F2EE5", "vulnerable": true}, {"criteria": "cpe:2.3:a:arubanetworks:clearpass:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "ADEE2E01-54D8-4C1B-914B-EA3B31F08871", "vulnerable": true}, {"criteria": "cpe:2.3:a:arubanetworks:clearpass:6.1.4.61696:*:*:*:*:*:*:*", "matchCriteriaId": "A6D81C26-0DE2-4E8A-AE68-04C0D095B4D4", "vulnerable": true}, {"criteria": "cpe:2.3:a:arubanetworks:clearpass:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E9826DA-B101-4806-885E-39CEEE27EA36", "vulnerable": true}, {"criteria": "cpe:2.3:a:arubanetworks:clearpass:6.2.6.62196:*:*:*:*:*:*:*", "matchCriteriaId": "F5F48D14-F418-45D3-8EC1-E2D90DE3F902", "vulnerable": true}, {"criteria": "cpe:2.3:a:arubanetworks:clearpass:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F1EF5D3-9C7D-4B48-96F3-371AF198CBCB", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in the Policy Manager in Aruba Networks ClearPass 5.x, 6.0.x, 6.1.x through 6.1.4.61696, 6.2.x through 6.2.6.62196, and 6.3.x before 6.3.4 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en Policy Manager en Aruba Networks ClearPass 5.x, 6.0.x, 6.1.x hasta 6.1.4.61696, 6.2.x hasta 6.2.6.62196 y 6.3.x anterior a 6.3.4 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s de vectores no especificados."}], "id": "CVE-2014-4013", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 4.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-07-14T14:55:06.983", "references": [{"source": "cve@mitre.org", "url": "http://secunia.com/advisories/58936"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.arubanetworks.com/support/alerts/aid-07032014.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58936"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.arubanetworks.com/support/alerts/aid-07032014.txt"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-89"}], "source": "nvd@nist.gov", "type": "Primary"}]}