cvelist/2022/42xxx/CVE-2022-42744.json

68 lines
2.1 KiB
JSON
Raw Normal View History

2022-10-10 22:00:33 +00:00
{
2022-11-04 01:00:34 +00:00
"data_version": "4.0",
2022-10-10 22:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-42744",
2022-11-03 20:01:14 +00:00
"ASSIGNER": "help@fluidattacks.com",
"STATE": "PUBLIC"
},
2022-11-04 01:00:34 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "CandidATS version 3.0.0 allows an external attacker to perform CRUD operations on the application databases. This is possible because the application does not correctly validate the entriesPerPage parameter against SQLi attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL injection"
}
]
}
]
},
2022-11-03 20:01:14 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "CandidATS",
"version": {
"version_data": [
{
2022-11-04 01:00:34 +00:00
"version_value": "3.0.0",
"version_affected": "="
2022-11-03 20:01:14 +00:00
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
2022-11-04 01:00:34 +00:00
"url": "https://candidats.net/",
2022-11-03 20:01:14 +00:00
"refsource": "MISC",
2022-11-04 01:00:34 +00:00
"name": "https://candidats.net/"
2022-11-03 20:01:14 +00:00
},
{
2022-11-04 01:00:34 +00:00
"url": "https://fluidattacks.com/advisories/mohawke/",
2022-11-03 20:01:14 +00:00
"refsource": "MISC",
2022-11-04 01:00:34 +00:00
"name": "https://fluidattacks.com/advisories/mohawke/"
2022-10-10 22:00:33 +00:00
}
]
}
}