CVE-2012-4237
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
20/08/2012
Last modified:
11/04/2025
Description
Multiple SQL injection vulnerabilities in TCExam before 11.3.008 allow remote authenticated users with level 5 or greater permissions to execute arbitrary SQL commands via the subject_module_id parameter to (1) tce_edit_answer.php or (2) tce_edit_question.php.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:tecnick:tcexam:*:*:*:*:*:*:*:* | 11.3.007 (including) | |
| cpe:2.3:a:tecnick:tcexam:10.1.000:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.001:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.002:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.003:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.004:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.005:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.006:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.008:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.009:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.010:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.011:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.012:*:*:*:*:*:*:* | ||
| cpe:2.3:a:tecnick:tcexam:10.1.013:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2012-08/0079.html
- http://freecode.com/projects/tcexam/releases/347125
- http://secunia.com/advisories/50141
- http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Bh%3Dedf6e08622642f1b2421f4355d98250d9e1b0742
- http://www.openwall.com/lists/oss-security/2012/08/13/8
- http://www.reactionpenetrationtesting.co.uk/tcexam-sql-injection.html
- http://www.securityfocus.com/bid/54861
- http://archives.neohapsis.com/archives/bugtraq/2012-08/0079.html
- http://freecode.com/projects/tcexam/releases/347125
- http://secunia.com/advisories/50141
- http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Bh%3Dedf6e08622642f1b2421f4355d98250d9e1b0742
- http://www.openwall.com/lists/oss-security/2012/08/13/8
- http://www.reactionpenetrationtesting.co.uk/tcexam-sql-injection.html
- http://www.securityfocus.com/bid/54861



