cvelist/2023/6xxx/CVE-2023-6575.json
2024-04-10 19:06:13 +00:00

110 lines
4.0 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6575",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in Byzoro S210 up to 20231121. It has been classified as critical. This affects an unknown part of the file /Tool/repair.php of the component HTTP POST Request Handler. The manipulation of the argument txt leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247155. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in Byzoro S210 bis 20231121 ausgemacht. Sie wurde als kritisch eingestuft. Es betrifft eine unbekannte Funktion der Datei /Tool/repair.php der Komponente HTTP POST Request Handler. Durch das Manipulieren des Arguments txt mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Byzoro",
"product": {
"product_data": [
{
"product_name": "S210",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "20231121"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.247155",
"refsource": "MISC",
"name": "https://vuldb.com/?id.247155"
},
{
"url": "https://vuldb.com/?ctiid.247155",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.247155"
},
{
"url": "https://vuldb.com/?submit.241692",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.241692"
},
{
"url": "https://github.com/houhuidong/cve/blob/main/rce.md",
"refsource": "MISC",
"name": "https://github.com/houhuidong/cve/blob/main/rce.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "houdong (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}
}