CVE-2008-3297
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
25/07/2008
Last modified:
09/04/2025
Description
Multiple SQL injection vulnerabilities in SocialEngine (SE) before 2.83 allow remote attackers to execute arbitrary SQL commands via (1) an se_user cookie to include/class_user.php or (2) an se_admin cookie to include/class_admin.php.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:social_engine:social_engine:*:*:*:*:*:*:*:* | 2.81 (including) | |
| cpe:2.3:a:social_engine:social_engine:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:1.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:1.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:2.0:online_beta:*:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:2.4:*:se:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:social_engine:social_engine:2.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/31203
- http://securityreason.com/securityalert/4035
- http://www.securityfocus.com/archive/1/494638/100/0/threaded
- http://www.securityfocus.com/bid/30342
- http://www.socialengine.net/news.php
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43958
- http://secunia.com/advisories/31203
- http://securityreason.com/securityalert/4035
- http://www.securityfocus.com/archive/1/494638/100/0/threaded
- http://www.securityfocus.com/bid/30342
- http://www.socialengine.net/news.php
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43958



