mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
80 lines
2.5 KiB
JSON
80 lines
2.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-5203",
|
|
"ASSIGNER": "contact@wpscan.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The WP Sessions Time Monitoring Full Automatic WordPress plugin before 1.0.9 does not sanitize the request URL or query parameters before using them in an SQL query, allowing unauthenticated attackers to extract sensitive data from the database via blind time based SQL injection techniques, or in some cases an error/union based technique."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-89 SQL Injection"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Unknown",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "WP Sessions Time Monitoring Full Automatic",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "0",
|
|
"version_value": "1.0.9"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932",
|
|
"refsource": "MISC",
|
|
"name": "https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "WPScan CVE Generator"
|
|
},
|
|
"source": {
|
|
"discovery": "EXTERNAL"
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Nicolas Surribas"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "WPScan"
|
|
}
|
|
]
|
|
} |