cvelist/2023/41xxx/CVE-2023-41362.json

77 lines
2.5 KiB
JSON
Raw Normal View History

2023-08-29 05:00:32 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2023-08-29 16:00:34 +00:00
"ID": "CVE-2023-41362",
"STATE": "PUBLIC"
2023-08-29 05:00:32 +00:00
},
2023-08-29 16:00:34 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2023-08-29 05:00:32 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2023-08-29 16:00:34 +00:00
"value": "MyBB before 1.8.36 allows Code Injection by users with certain high privileges. Templates in Admin CP intentionally use eval, and there was some validation of the input to eval, but type juggling interfered with this when using PCRE within PHP."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://mybb.com/versions/1.8.36/",
"refsource": "MISC",
"name": "https://mybb.com/versions/1.8.36/"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/mybb/mybb/security/advisories/GHSA-pr74-wvp3-q6f5",
"url": "https://github.com/mybb/mybb/security/advisories/GHSA-pr74-wvp3-q6f5"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/mybb/mybb/commit/a43a6f22944e769a6eabc58c39e7bc18c1cab4ca.patch",
"url": "https://github.com/mybb/mybb/commit/a43a6f22944e769a6eabc58c39e7bc18c1cab4ca.patch"
2023-09-11 15:00:34 +00:00
},
{
"refsource": "MISC",
"name": "https://blog.sorcery.ie/posts/mybb_acp_rce/",
"url": "https://blog.sorcery.ie/posts/mybb_acp_rce/"
2023-08-29 05:00:32 +00:00
}
]
}
}