{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2023-23753", "ASSIGNER": "security@joomla.org", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "The 'Visforms Base Package for Joomla 3' extension is vulnerable to SQL Injection as concatenation is used to construct an SQL Query. An attacker can interact with the database and could be able to read, modify and delete data on it." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "SQL Injection" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "vi-solutions", "product": { "product_data": [ { "product_name": "Visforms Base Package for Joomla 3", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "status": "affected", "version": "3.0.4" }, { "status": "unaffected", "version": "3.0.5" } ], "defaultStatus": "affected" } } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://vi-solutions.de/en/announcements/867-security-announcement-cve-2023-23754", "refsource": "MISC", "name": "https://vi-solutions.de/en/announcements/867-security-announcement-cve-2023-23754" }, { "url": "https://blog.asturhackers.es/sql-injection-en-visforms-base-package-for-joomla-3-0-5-cve-2023-23753", "refsource": "MISC", "name": "https://blog.asturhackers.es/sql-injection-en-visforms-base-package-for-joomla-3-0-5-cve-2023-23753" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "source": { "discovery": "UNKNOWN" }, "credits": [ { "lang": "en", "value": "David \u00c1lvarez, Francisco D\u00edaz-Pache and Sergio Corral from Grupo CIES - AliSEC and Kevin Barb\u00f3n" } ] }