{"api_version":"1","generated_at":"2026-05-06T16:52:38+00:00","cve":"CVE-2018-1252","urls":{"html":"https://cve.report/CVE-2018-1252","api":"https://cve.report/api/cve/CVE-2018-1252.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-1252","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-1252"},"summary":{"title":"CVE-2018-1252","description":"RSA Web Threat Detection versions prior to 6.4, contain an SQL injection vulnerability in the Administration and Forensics applications. An authenticated malicious user with low privileges could potentially exploit this vulnerability to execute SQL commands on the back-end database to gain unauthorized access to the tool's monitoring and user information by supplying specially crafted input data to the affected application.","state":"PUBLIC","assigner":"security_alert@emc.com","published_at":"2018-06-05 12:29:00","updated_at":"2019-07-15 13:59:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"http://seclists.org/fulldisclosure/2018/Jun/4","name":"20180531 DSA-2018-085: RSA Web Threat Detection SQL Injection Vulnerability","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: DSA-2018-085: RSA Web Threat Detection SQL Injection\tVulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/104396","name":"104396","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"EMC RSA Web Threat Detection CVE-2018-1252 SQL Injection Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securitytracker.com/id/1041026","name":"1041026","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"RSA Web Threat Detection Input Validation Flaw in Administration and Forensics Applications Lets Remote Authenticated Users Inject SQL Commands - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-1252","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1252","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"1252","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rsa","cpe5":"web_threat_detection","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1252","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rsa","cpe5":"web_threat_detection","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security_alert@emc.com","DATE_PUBLIC":"2018-05-31T04:00:00.000Z","ID":"CVE-2018-1252","STATE":"PUBLIC","TITLE":"RSA Web Threat Detection SQL Injection Vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Web Threat Detection","version":{"version_data":[{"affected":"<","version_value":"6.4"}]}}]},"vendor_name":"RSA"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"RSA Web Threat Detection versions prior to 6.4, contain an SQL injection vulnerability in the Administration and Forensics applications. An authenticated malicious user with low privileges could potentially exploit this vulnerability to execute SQL commands on the back-end database to gain unauthorized access to the tool's monitoring and user information by supplying specially crafted input data to the affected application."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"SQL Injection\tVulnerability"}]}]},"references":{"reference_data":[{"name":"1041026","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1041026"},{"name":"104396","refsource":"BID","url":"http://www.securityfocus.com/bid/104396"},{"name":"20180531 DSA-2018-085: RSA Web Threat Detection SQL Injection Vulnerability","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2018/Jun/4"}]},"source":{"advisory":"DSA-2018-085","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2018-06-05 12:29:00","lastModifiedDate":"2019-07-15 13:59:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rsa:web_threat_detection:*:*:*:*:*:*:*:*","versionEndExcluding":"6.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"1252","Ordinal":"116547","Title":"CVE-2018-1252","CVE":"CVE-2018-1252","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"1252","Ordinal":"1","NoteData":"RSA Web Threat Detection versions prior to 6.4, contain an SQL injection vulnerability in the Administration and Forensics applications. An authenticated malicious user with low privileges could potentially exploit this vulnerability to execute SQL commands on the back-end database to gain unauthorized access to the tool's monitoring and user information by supplying specially crafted input data to the affected application.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"1252","Ordinal":"2","NoteData":"2018-06-05","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"1252","Ordinal":"3","NoteData":"2018-06-07","Type":"Other","Title":"Modified"}]}}}