cvelist/2023/0xxx/CVE-2023-0037.json
2023-03-13 17:00:36 +00:00

89 lines
2.7 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-0037",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The 10Web Map Builder for Google Maps WordPress plugin before 1.0.73 does not properly sanitise and escape some parameters before using them in an SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "10Web Map Builder for Google Maps",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.0.73"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/33ab1fe2-6611-4f43-91ba-52c56f02ed56",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/33ab1fe2-6611-4f43-91ba-52c56f02ed56"
},
{
"url": "https://bulletin.iese.de/post/wd-google-maps_1-0-72_1",
"refsource": "MISC",
"name": "https://bulletin.iese.de/post/wd-google-maps_1-0-72_1"
}
]
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Daniel Krohmer (Fraunhofer IESE)"
},
{
"lang": "en",
"value": "Kunal Sharma (University of Kaiserslautern)"
},
{
"lang": "en",
"value": "WPScan"
}
]
}