cvelist/2023/5xxx/CVE-2023-5203.json

80 lines
2.5 KiB
JSON
Raw Normal View History

2023-09-27 14:59:13 +00:00
{
2023-12-26 19:00:33 +00:00
"data_version": "4.0",
2023-09-27 14:59:13 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-5203",
2023-12-26 19:00:33 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2023-09-27 14:59:13 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-12-26 19:00:33 +00:00
"value": "The WP Sessions Time Monitoring Full Automatic WordPress plugin before 1.0.9 does not sanitize the request URL or query parameters before using them in an SQL query, allowing unauthenticated attackers to extract sensitive data from the database via blind time based SQL injection techniques, or in some cases an error/union based technique."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WP Sessions Time Monitoring Full Automatic",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.0.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932"
2023-09-27 14:59:13 +00:00
}
]
2023-12-26 19:00:33 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Nicolas Surribas"
},
{
"lang": "en",
"value": "WPScan"
}
]
2023-09-27 14:59:13 +00:00
}