CVE-2015-0842

| EUVD-2015-0854 CRITICAL
2025-06-26 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 15, 2026 - 23:54 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 23:54 euvd
EUVD-2015-0854
CVE Published
Jun 26, 2025 - 22:15 nvd
CRITICAL 9.8

Description

yubiserver before 0.6 is prone to SQL injection issues, potentially leading to an authentication bypass.

Analysis

yubiserver before 0.6 is prone to SQL injection issues, potentially leading to an authentication bypass.

Technical Context

SQL injection occurs when user-supplied input is incorporated into SQL queries without proper sanitization or parameterized queries.

Affected Products

Affected products: Debian Yubiserver 0.2-2

Remediation

Use parameterized queries or prepared statements. Apply input validation and escape special characters. Implement least-privilege database accounts.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +49
POC: 0

Vendor Status

Ubuntu

Priority: Medium
yubiserver
Release Status Version
artful ignored end of life
bionic not-affected 0.6-3
cosmic not-affected 0.6-3
disco not-affected 0.6-3
precise ignored end of life
upstream released 0.6-1
utopic ignored end of life
vivid ignored end of life
wily ignored end of life
xenial not-affected 0.6-3
yakkety ignored end of life
zesty ignored end of life
trusty DNE trusty/esm was DNE [trusty was needed]

Debian

Bug #796495
yubiserver
Release Status Fixed Version Urgency
bookworm, bullseye fixed 0.6-3.1 -
trixie fixed 0.6-3.2 -
(unstable) fixed 0.6-1 -

Share

CVE-2015-0842 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy