2023-08-09 10:00:35 +00:00
{
"id" : "CVE-2023-23574" ,
"sourceIdentifier" : "prodsec@nozominetworks.com" ,
"published" : "2023-08-09T09:15:13.767" ,
2024-05-28 14:03:31 +00:00
"lastModified" : "2024-05-28T13:15:09.070" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-08-09 10:00:35 +00:00
"descriptions" : [
{
"lang" : "en" ,
2024-05-28 14:03:31 +00:00
"value" : "A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the alerts_count component, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.\n\nAuthenticated users can extract arbitrary information from the DBMS in an uncontrolled way."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de inyecci\u00f3n blind SQL en Nozomi Networks Guardian y CMC, debida a una validaci\u00f3n de entrada incorrecta en el componente alerts_count, permite a un atacante autenticado ejecutar consultas SQL arbitrarias en el DBMS utilizado por la aplicaci\u00f3n web.\n\nLos usuarios autenticados pueden extraer informaci\u00f3n arbitraria del DBMS de forma incontrolada."
2023-08-09 10:00:35 +00:00
}
] ,
"metrics" : {
2024-07-14 02:06:08 +00:00
"cvssMetricV40" : [
{
"source" : "prodsec@nozominetworks.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"vulnerableSystemConfidentiality" : "HIGH" ,
"vulnerableSystemIntegrity" : "NONE" ,
"vulnerableSystemAvailability" : "LOW" ,
"subsequentSystemConfidentiality" : "NONE" ,
"subsequentSystemIntegrity" : "NONE" ,
"subsequentSystemAvailability" : "NONE" ,
"exploitMaturity" : "NOT_DEFINED" ,
"confidentialityRequirements" : "NOT_DEFINED" ,
"integrityRequirements" : "NOT_DEFINED" ,
"availabilityRequirements" : "NOT_DEFINED" ,
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
"modifiedVulnerableSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedVulnerableSystemIntegrity" : "NOT_DEFINED" ,
"modifiedVulnerableSystemAvailability" : "NOT_DEFINED" ,
"modifiedSubsequentSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedSubsequentSystemIntegrity" : "NOT_DEFINED" ,
"modifiedSubsequentSystemAvailability" : "NOT_DEFINED" ,
"safety" : "NOT_DEFINED" ,
"automatable" : "NOT_DEFINED" ,
"recovery" : "NOT_DEFINED" ,
"valueDensity" : "NOT_DEFINED" ,
"vulnerabilityResponseEffort" : "NOT_DEFINED" ,
"providerUrgency" : "NOT_DEFINED" ,
"baseScore" : 7.1 ,
"baseSeverity" : "HIGH"
}
}
] ,
2023-08-09 10:00:35 +00:00
"cvssMetricV31" : [
2023-08-15 18:00:37 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
} ,
2023-08-09 10:00:35 +00:00
{
"source" : "prodsec@nozominetworks.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 7.1 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 4.2
}
]
} ,
"weaknesses" : [
2023-08-15 18:00:37 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
} ,
2023-08-09 10:00:35 +00:00
{
"source" : "prodsec@nozominetworks.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
2023-08-15 18:00:37 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "22.6.2" ,
"matchCriteriaId" : "D5DACA15-76B3-417A-8776-9014575659A6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "22.6.2" ,
"matchCriteriaId" : "6317D905-9F4B-42A1-937E-AB79D99B1973"
}
]
}
]
}
] ,
2023-08-09 10:00:35 +00:00
"references" : [
{
"url" : "https://security.nozominetworks.com/NN-2023:3-01" ,
2023-08-15 18:00:37 +00:00
"source" : "prodsec@nozominetworks.com" ,
"tags" : [
"Vendor Advisory"
]
2023-08-09 10:00:35 +00:00
}
]
}