cvelist/2023/44xxx/CVE-2023-44449.json

83 lines
3.2 KiB
JSON
Raw Normal View History

2023-09-28 19:00:34 +00:00
{
2024-05-03 03:01:05 +00:00
"data_version": "4.0",
2023-09-28 19:00:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-44449",
2024-05-03 03:01:05 +00:00
"ASSIGNER": "zdi-disclosures@trendmicro.com",
"STATE": "PUBLIC"
2023-09-28 19:00:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-05-03 03:01:05 +00:00
"value": "NETGEAR ProSAFE Network Management System clearAlertByIds SQL Injection Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the clearAlertByIds function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-21875."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "NETGEAR",
"product": {
"product_data": [
{
"product_name": "ProSAFE Network Management System",
"version": {
"version_data": [
{
"version_affected": "=",
2024-09-18 19:00:39 +00:00
"version_value": "1.7.0.26 x64"
2024-05-03 03:01:05 +00:00
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1717/",
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-23-1717/"
},
{
"url": "https://kb.netgear.com/000065866/Security-Advisory-for-Multiple-Vulnerabilities-on-the-NMS300-PSV-2023-0114-PSV-2023-0115",
"refsource": "MISC",
"name": "https://kb.netgear.com/000065866/Security-Advisory-for-Multiple-Vulnerabilities-on-the-NMS300-PSV-2023-0114-PSV-2023-0115"
}
]
},
"source": {
"lang": "en",
"value": "Alex Williams of Trend Micro Security Research"
},
"impact": {
"cvss": [
{
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH"
2023-09-28 19:00:34 +00:00
}
]
}
}