cvelist/2024/0xxx/CVE-2024-0481.json

125 lines
4.9 KiB
JSON
Raw Normal View History

2024-01-12 12:00:36 +00:00
{
2024-01-13 09:00:39 +00:00
"data_version": "4.0",
2024-01-12 12:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-0481",
2024-01-13 09:00:39 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2024-01-12 12:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-13 09:00:39 +00:00
"value": "A vulnerability was found in Taokeyun up to 1.0.5. It has been rated as critical. Affected by this issue is the function shopGoods of the file application/index/controller/app/store/Goods.php of the component HTTP POST Request Handler. The manipulation of the argument keyword leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250586 is the identifier assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Eine kritische Schwachstelle wurde in Taokeyun bis 1.0.5 ausgemacht. Es geht hierbei um die Funktion shopGoods der Datei application/index/controller/app/store/Goods.php der Komponente HTTP POST Request Handler. Mittels Manipulieren des Arguments keyword mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Taokeyun",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.0"
},
{
"version_affected": "=",
"version_value": "1.0.1"
},
{
"version_affected": "=",
"version_value": "1.0.2"
},
{
"version_affected": "=",
"version_value": "1.0.3"
},
{
"version_affected": "=",
"version_value": "1.0.4"
},
{
"version_affected": "=",
"version_value": "1.0.5"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.250586",
"refsource": "MISC",
"name": "https://vuldb.com/?id.250586"
},
{
"url": "https://vuldb.com/?ctiid.250586",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.250586"
},
{
"url": "https://note.zhaoj.in/share/TKWDqowIoLqs",
"refsource": "MISC",
"name": "https://note.zhaoj.in/share/TKWDqowIoLqs"
}
]
},
"credits": [
{
"lang": "en",
"value": "glzjin (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
2024-01-12 12:00:36 +00:00
}
]
}
}