{"api_version":"1","generated_at":"2026-04-29T17:28:15+00:00","cve":"CVE-2009-0252","urls":{"html":"https://cve.report/CVE-2009-0252","api":"https://cve.report/api/cve/CVE-2009-0252.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2009-0252","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2009-0252"},"summary":{"title":"CVE-2009-0252","description":"Multiple SQL injection vulnerabilities in default.asp in Enthrallweb eReservations allow remote attackers to execute arbitrary SQL commands via the (1) Login parameter (aka username field) or the (2) Password parameter (aka password field).  NOTE: some of these details are obtained from third party information.","state":"PUBLISHED","assigner":"mitre","published_at":"2009-01-22 16:30:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-89","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://secunia.com/advisories/33578","name":"http://secunia.com/advisories/33578","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"eReservations \"Login\" and \"Password\" SQL Injection - Secunia Advisories - Vulnerability Information - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/7801","name":"https://www.exploit-db.com/exploits/7801","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"eReservations (Auth Bypass) SQL Injection Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/33321","name":"http://www.securityfocus.com/bid/33321","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"eReservations Login SQL Injection Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48062","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48062","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://osvdb.org/51456","name":"http://osvdb.org/51456","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2009-0252","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0252","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2009","cve_id":"252","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"enthrallweb","cpe5":"ereservations","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T04:24:18.417Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"33578","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/33578"},{"name":"51456","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/51456"},{"name":"33321","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/33321"},{"name":"ereservations-login-sql-injection(48062)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48062"},{"name":"7801","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/7801"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2009-01-16T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple SQL injection vulnerabilities in default.asp in Enthrallweb eReservations allow remote attackers to execute arbitrary SQL commands via the (1) Login parameter (aka username field) or the (2) Password parameter (aka password field).  NOTE: some of these details are obtained from third party information."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-09-28T12:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"33578","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/33578"},{"name":"51456","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/51456"},{"name":"33321","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/33321"},{"name":"ereservations-login-sql-injection(48062)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48062"},{"name":"7801","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/7801"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2009-0252","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple SQL injection vulnerabilities in default.asp in Enthrallweb eReservations allow remote attackers to execute arbitrary SQL commands via the (1) Login parameter (aka username field) or the (2) Password parameter (aka password field).  NOTE: some of these details are obtained from third party information."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"33578","refsource":"SECUNIA","url":"http://secunia.com/advisories/33578"},{"name":"51456","refsource":"OSVDB","url":"http://osvdb.org/51456"},{"name":"33321","refsource":"BID","url":"http://www.securityfocus.com/bid/33321"},{"name":"ereservations-login-sql-injection(48062)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48062"},{"name":"7801","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/7801"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2009-0252","datePublished":"2009-01-22T16:00:00.000Z","dateReserved":"2009-01-22T00:00:00.000Z","dateUpdated":"2024-08-07T04:24:18.417Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2009-01-22 16:30:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-89","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:enthrallweb:ereservations:*:*:*:*:*:*:*:*","matchCriteriaId":"7999D016-295C-4A8C-A4D3-202862F4390C"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2009","CveId":"252","Ordinal":"1","Title":"CVE-2009-0252","CVE":"CVE-2009-0252","Year":"2009"},"notes":[{"CveYear":"2009","CveId":"252","Ordinal":"1","NoteData":"Multiple SQL injection vulnerabilities in default.asp in Enthrallweb eReservations allow remote attackers to execute arbitrary SQL commands via the (1) Login parameter (aka username field) or the (2) Password parameter (aka password field).  NOTE: some of these details are obtained from third party information.","Type":"Description","Title":"CVE-2009-0252"},{"CveYear":"2009","CveId":"252","Ordinal":"2","NoteData":"2009-01-22","Type":"Other","Title":"Published"},{"CveYear":"2009","CveId":"252","Ordinal":"3","NoteData":"2017-09-28","Type":"Other","Title":"Modified"}]}}}