2024-06-28 16:04:01 +00:00
{
"id" : "CVE-2024-3816" ,
"sourceIdentifier" : "cvd@cert.pl" ,
"published" : "2024-06-28T13:15:03.283" ,
2024-08-01 14:03:18 +00:00
"lastModified" : "2024-08-01T13:56:42.403" ,
"vulnStatus" : "Modified" ,
2024-06-28 16:04:01 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
2024-07-03 16:04:42 +00:00
} ,
{
"lang" : "es" ,
"value" : "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a una inyecci\u00f3n SQL ciega ejecutada mediante la barra de b\u00fasqueda. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema."
2024-06-28 16:04:01 +00:00
}
] ,
2024-07-03 16:04:42 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
2024-08-01 14:03:18 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
2024-07-03 16:04:42 +00:00
}
]
} ,
2024-06-28 16:04:01 +00:00
"weaknesses" : [
2024-07-03 16:04:42 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
} ,
2024-06-28 16:04:01 +00:00
{
"source" : "cvd@cert.pl" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
2024-07-03 16:04:42 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "3.3" ,
"matchCriteriaId" : "00A1AF5A-47FF-4080-A506-DB634A54CD6C"
}
]
}
]
}
] ,
2024-06-28 16:04:01 +00:00
"references" : [
{
"url" : "https://cert.pl/en/posts/2024/06/CVE-2024-3800" ,
2024-07-03 16:04:42 +00:00
"source" : "cvd@cert.pl" ,
"tags" : [
"Third Party Advisory"
]
2024-06-28 16:04:01 +00:00
} ,
{
"url" : "https://cert.pl/posts/2024/06/CVE-2024-3800" ,
2024-07-03 16:04:42 +00:00
"source" : "cvd@cert.pl" ,
"tags" : [
"Third Party Advisory"
]
2024-06-28 16:04:01 +00:00
}
]
}