mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
145 lines
5.8 KiB
JSON
145 lines
5.8 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-7145",
|
|
"ASSIGNER": "cna@vuldb.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability classified as critical was found in gopeak MasterLab up to 3.3.10. This vulnerability affects the function sqlInject of the file app/ctrl/Framework.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249148."
|
|
},
|
|
{
|
|
"lang": "deu",
|
|
"value": "In gopeak MasterLab bis 3.3.10 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Dabei geht es um die Funktion sqlInject der Datei app/ctrl/Framework.php der Komponente HTTP POST Request Handler. Durch das Beeinflussen des Arguments pwd mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-89 SQL Injection",
|
|
"cweId": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "gopeak",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "MasterLab",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.9"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "3.3.10"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://vuldb.com/?id.249148",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?id.249148"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?ctiid.249148",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?ctiid.249148"
|
|
},
|
|
{
|
|
"url": "https://note.zhaoj.in/share/LEbo1ypfzfQh",
|
|
"refsource": "MISC",
|
|
"name": "https://note.zhaoj.in/share/LEbo1ypfzfQh"
|
|
}
|
|
]
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "glzjin (VulDB User)"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"baseScore": 6.3,
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
{
|
|
"version": "3.0",
|
|
"baseScore": 6.3,
|
|
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
{
|
|
"version": "2.0",
|
|
"baseScore": 5.8,
|
|
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P"
|
|
}
|
|
]
|
|
}
|
|
} |