cvelist/2020/27xxx/CVE-2020-27240.json

70 lines
2.3 KiB
JSON
Raw Normal View History

2020-10-19 16:01:45 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-27240",
2021-04-19 21:00:39 +00:00
"ASSIGNER": "talos-cna@cisco.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "OpenClinic",
"version": {
"version_data": [
{
"version_value": "OpenClinic GA 5.173.3"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2022-04-28 14:36:12 -04:00
"value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
2021-04-19 21:00:39 +00:00
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207"
}
]
2020-10-19 16:01:45 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2021-04-19 21:00:39 +00:00
"value": "An exploitable SQL injection vulnerability exists in \u2018getAssets.jsp\u2019 page of OpenClinic GA 5.173.3. The componentStatus parameter in the getAssets.jsp page is vulnerable to unauthenticated SQL injection An attacker can make an authenticated HTTP request to trigger this vulnerability."
2020-10-19 16:01:45 +00:00
}
]
2022-04-18 17:22:54 -04:00
},
"impact": {
"cvss": {
"baseScore": 6.4,
"baseSeverity": "Medium",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
}
2020-10-19 16:01:45 +00:00
}
}