cvelist/2023/7xxx/CVE-2023-7146.json
2023-12-29 02:00:37 +00:00

145 lines
5.9 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-7146",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as critical, has been found in gopeak MasterLab up to 3.3.10. This issue affects the function sqlInjectDelete of the file app/ctrl/framework/Feature.php of the component HTTP POST Request Handler. The manipulation of the argument phone leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249149 was assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in gopeak MasterLab bis 3.3.10 entdeckt. Sie wurde als kritisch eingestuft. Hierbei geht es um die Funktion sqlInjectDelete der Datei app/ctrl/framework/Feature.php der Komponente HTTP POST Request Handler. Durch Beeinflussen des Arguments phone mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "gopeak",
"product": {
"product_data": [
{
"product_name": "MasterLab",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.3.0"
},
{
"version_affected": "=",
"version_value": "3.3.1"
},
{
"version_affected": "=",
"version_value": "3.3.2"
},
{
"version_affected": "=",
"version_value": "3.3.3"
},
{
"version_affected": "=",
"version_value": "3.3.4"
},
{
"version_affected": "=",
"version_value": "3.3.5"
},
{
"version_affected": "=",
"version_value": "3.3.6"
},
{
"version_affected": "=",
"version_value": "3.3.7"
},
{
"version_affected": "=",
"version_value": "3.3.8"
},
{
"version_affected": "=",
"version_value": "3.3.9"
},
{
"version_affected": "=",
"version_value": "3.3.10"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.249149",
"refsource": "MISC",
"name": "https://vuldb.com/?id.249149"
},
{
"url": "https://vuldb.com/?ctiid.249149",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.249149"
},
{
"url": "https://note.zhaoj.in/share/jRqEcVBTsZh4",
"refsource": "MISC",
"name": "https://note.zhaoj.in/share/jRqEcVBTsZh4"
}
]
},
"credits": [
{
"lang": "en",
"value": "glzjin (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5.8,
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P"
}
]
}
}