cvelist/2023/50xxx/CVE-2023-50867.json

93 lines
2.9 KiB
JSON
Raw Normal View History

2023-12-14 18:00:33 +00:00
{
2024-01-04 15:00:36 +00:00
"data_version": "4.0",
2023-12-14 18:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-50867",
2024-01-04 15:00:36 +00:00
"ASSIGNER": "help@fluidattacks.com",
"STATE": "PUBLIC"
2023-12-14 18:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-04 15:00:36 +00:00
"value": "Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the signupAction.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Kashipara Group",
"product": {
"product_data": [
{
"product_name": "Travel Website",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://fluidattacks.com/advisories/evans/",
"refsource": "MISC",
"name": "https://fluidattacks.com/advisories/evans/"
},
{
"url": "https://www.kashipara.com/",
"refsource": "MISC",
"name": "https://www.kashipara.com/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2023-12-14 18:00:33 +00:00
}
]
}
}