2024-08-30 12:03:16 +00:00
{
"id" : "CVE-2024-8331" ,
"sourceIdentifier" : "cna@vuldb.com" ,
"published" : "2024-08-30T11:15:15.120" ,
2024-09-03 16:03:22 +00:00
"lastModified" : "2024-09-03T14:25:51.337" ,
"vulnStatus" : "Analyzed" ,
2024-08-30 12:03:16 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been classified as critical. This affects an unknown part of the file /admin/user/user-move-run.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
2024-08-30 14:03:14 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se ha detectado una vulnerabilidad en OpenRapid RapidCMS hasta la versi\u00f3n 1.3.1. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /admin/user/user-move-run.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
2024-08-30 12:03:16 +00:00
}
] ,
"metrics" : {
"cvssMetricV40" : [
{
"source" : "cna@vuldb.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"vulnerableSystemConfidentiality" : "LOW" ,
"vulnerableSystemIntegrity" : "LOW" ,
"vulnerableSystemAvailability" : "LOW" ,
"subsequentSystemConfidentiality" : "NONE" ,
"subsequentSystemIntegrity" : "NONE" ,
"subsequentSystemAvailability" : "NONE" ,
"exploitMaturity" : "NOT_DEFINED" ,
"confidentialityRequirements" : "NOT_DEFINED" ,
"integrityRequirements" : "NOT_DEFINED" ,
"availabilityRequirements" : "NOT_DEFINED" ,
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
"modifiedVulnerableSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedVulnerableSystemIntegrity" : "NOT_DEFINED" ,
"modifiedVulnerableSystemAvailability" : "NOT_DEFINED" ,
"modifiedSubsequentSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedSubsequentSystemIntegrity" : "NOT_DEFINED" ,
"modifiedSubsequentSystemAvailability" : "NOT_DEFINED" ,
"safety" : "NOT_DEFINED" ,
"automatable" : "NOT_DEFINED" ,
"recovery" : "NOT_DEFINED" ,
"valueDensity" : "NOT_DEFINED" ,
"vulnerabilityResponseEffort" : "NOT_DEFINED" ,
"providerUrgency" : "NOT_DEFINED" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM"
}
}
] ,
"cvssMetricV31" : [
2024-09-03 16:03:22 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
} ,
2024-08-30 12:03:16 +00:00
{
"source" : "cna@vuldb.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 6.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.4
}
] ,
"cvssMetricV2" : [
{
"source" : "cna@vuldb.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 6.5
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "cna@vuldb.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
2024-09-03 16:03:22 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openrapid:rapidcms:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.3.1" ,
"matchCriteriaId" : "4B940B4E-523D-4679-83AA-3D3F0C9B17E2"
}
]
}
]
}
] ,
2024-08-30 12:03:16 +00:00
"references" : [
{
"url" : "https://gitee.com/A0kooo/cve_article/blob/master/RapidCMS/SQL%20injection1/rapidcms%20user-move-run.php%20SQL%20injection.md" ,
2024-09-03 16:03:22 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Exploit"
]
2024-08-30 12:03:16 +00:00
} ,
{
"url" : "https://vuldb.com/?ctiid.276207" ,
2024-09-03 16:03:22 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Permissions Required"
]
2024-08-30 12:03:16 +00:00
} ,
{
"url" : "https://vuldb.com/?id.276207" ,
2024-09-03 16:03:22 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Permissions Required" ,
"Third Party Advisory"
]
2024-08-30 12:03:16 +00:00
} ,
{
"url" : "https://vuldb.com/?submit.398769" ,
2024-09-03 16:03:22 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
2024-08-30 12:03:16 +00:00
}
]
}