UBUNTU-CVE-2022-4093

Source
https://ubuntu.com/security/CVE-2022-4093
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-4093.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2022-4093
Related
Published
2022-11-21T05:15:00Z
Modified
2025-06-02T17:16:01Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

SQL injection attacks can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker can obtain a persistent backdoor into an organization's systems, leading to a long-term compromise that can go unnoticed for an extended period. This affect 16.0.1 and 16.0.2 only. 16.0.0 or lower, and 16.0.3 or higher are not affected

References

Affected packages

Ubuntu:Pro:16.04:LTS / dolibarr

Package

Name
dolibarr
Purl
pkg:deb/ubuntu/dolibarr@3.5.8+dfsg1-1ubuntu1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.5.5+dfsg1-2
3.5.7+dfsg1-1
3.5.8+dfsg1-1
3.5.8+dfsg1-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}