mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
129 lines
5.1 KiB
JSON
129 lines
5.1 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-3232",
|
|
"ASSIGNER": "cna@vuldb.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability was found in Zhong Bang CRMEB up to 4.6.0 and classified as critical. This issue affects some unknown processing of the file /api/wechat/app_auth of the component Image Upload. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231503. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
|
},
|
|
{
|
|
"lang": "deu",
|
|
"value": "Eine kritische Schwachstelle wurde in Zhong Bang CRMEB bis 4.6.0 gefunden. Betroffen davon ist ein unbekannter Prozess der Datei /api/wechat/app_auth der Komponente Image Upload. Durch Manipulieren mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-502 Deserialization",
|
|
"cweId": "CWE-502"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Zhong Bang",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "CRMEB",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "4.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "4.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "4.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "4.3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "4.4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "4.5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "4.6"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://vuldb.com/?id.231503",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?id.231503"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?ctiid.231503",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?ctiid.231503"
|
|
},
|
|
{
|
|
"url": "https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20Broken%20Access%20Control.md",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20Broken%20Access%20Control.md"
|
|
}
|
|
]
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "p0ison (VulDB User)"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"baseScore": 6.3,
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
{
|
|
"version": "3.0",
|
|
"baseScore": 6.3,
|
|
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
{
|
|
"version": "2.0",
|
|
"baseScore": 5.8,
|
|
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P"
|
|
}
|
|
]
|
|
}
|
|
} |