cvelist/2024/4xxx/CVE-2024-4893.json
2024-05-15 03:00:34 +00:00

119 lines
4.1 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-4893",
"ASSIGNER": "cve@cert.org.tw",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "DigiWin EasyFlow .NET lacks validation for certain input parameters, allowing remote attackers to inject arbitrary SQL commands. This vulnerability enables unauthorized access to read, modify, and delete database records, as well as execute system commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "DigiWin",
"product": {
"product_data": [
{
"product_name": "EasyFlow .NET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.x"
},
{
"version_affected": "=",
"version_value": "5.x"
},
{
"version_affected": "=",
"version_value": "6.1.x"
},
{
"version_affected": "=",
"version_value": "6.6.x"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-7800-843f1-1.html",
"refsource": "MISC",
"name": "https://www.twcert.org.tw/tw/cp-132-7800-843f1-1.html"
},
{
"url": "https://www.twcert.org.tw/en/cp-139-7801-67d07-2.html",
"refsource": "MISC",
"name": "https://www.twcert.org.tw/en/cp-139-7801-67d07-2.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "TVN-202405001",
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Contact the vendor to install the patch."
}
],
"value": "Contact the vendor to install the patch."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}
}