cvelist/2018/3xxx/CVE-2018-3882.json

64 lines
1.9 KiB
JSON
Raw Normal View History

2018-01-02 17:05:29 -05:00
{
"CVE_data_meta" : {
2018-09-12 09:29:14 -04:00
"ASSIGNER" : "talos-cna@cisco.com",
"DATE_PUBLIC" : "2018-09-05T00:00:00",
2018-01-02 17:05:29 -05:00
"ID" : "CVE-2018-3882",
2018-09-12 09:29:14 -04:00
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "ERPNext",
"version" : {
"version_data" : [
{
"version_value" : "ERPNext v10.1.6 (master)"
}
]
}
}
]
},
"vendor_name" : "Talos"
}
]
}
2018-01-02 17:05:29 -05:00
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
2018-09-12 09:29:14 -04:00
"value" : "An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The searchfield parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "SQL injection"
}
]
}
]
},
"references" : {
"reference_data" : [
{
2018-09-12 10:06:03 -04:00
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560",
"refsource" : "MISC",
2018-09-12 09:29:14 -04:00
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560"
2018-01-02 17:05:29 -05:00
}
]
}
}