cvelist/2024/36xxx/CVE-2024-36410.json

90 lines
3.1 KiB
JSON
Raw Normal View History

2024-05-27 16:00:33 +00:00
{
2024-06-10 18:01:40 +00:00
"data_version": "4.0",
2024-05-27 16:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-36410",
2024-06-10 18:01:40 +00:00
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
2024-05-27 16:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-06-10 18:01:40 +00:00
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax messages count controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "salesagility",
"product": {
"product_data": [
{
"product_name": "SuiteCRM",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "< 7.14.4"
},
{
"version_affected": "=",
"version_value": ">= 8.0.0, < 8.6.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-7jj8-m2wj-m6xq",
"refsource": "MISC",
"name": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-7jj8-m2wj-m6xq"
}
]
},
"source": {
"advisory": "GHSA-7jj8-m2wj-m6xq",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
2024-05-27 16:00:33 +00:00
}
]
}
}