cvelist/2023/3xxx/CVE-2023-3969.json
2023-10-25 17:37:17 +00:00

99 lines
3.7 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-3969",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability, which was classified as problematic, has been found in GZ Scripts Availability Booking Calendar PHP 1.0. Affected by this issue is some unknown functionality of the file index.php of the component HTTP POST Request Handler. The manipulation of the argument promo_code leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235568."
},
{
"lang": "deu",
"value": "Eine problematische Schwachstelle wurde in GZ Scripts Availability Booking Calendar PHP 1.0 entdeckt. Betroffen davon ist ein unbekannter Prozess der Datei index.php der Komponente HTTP POST Request Handler. Durch die Manipulation des Arguments promo_code mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross Site Scripting",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GZ Scripts",
"product": {
"product_data": [
{
"product_name": "Availability Booking Calendar PHP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.235568",
"refsource": "MISC",
"name": "https://vuldb.com/?id.235568"
},
{
"url": "https://vuldb.com/?ctiid.235568",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.235568"
},
{
"url": "https://seclists.org/fulldisclosure/2023/Jul/51",
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2023/Jul/51"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 3.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "3.0",
"baseScore": 3.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
},
{
"version": "2.0",
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N"
}
]
}
}