2023-12-20 17:00:29 +00:00
{
"id" : "CVE-2023-33209" ,
"sourceIdentifier" : "audit@patchstack.com" ,
"published" : "2023-12-20T16:15:08.130" ,
2023-12-26 23:00:28 +00:00
"lastModified" : "2023-12-26T21:36:15.107" ,
"vulnStatus" : "Analyzed" ,
2023-12-20 17:00:29 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CrawlSpider SEO Change Monitor \u2013 Track Website Changes.This issue affects SEO Change Monitor \u2013 Track Website Changes: from n/a through 1.2.\n\n"
2023-12-26 23:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en CrawlSpider SEO Change Monitor \u2013 Track Website Changes. Este problema afecta a SEO Change Monitor \u2013 Track Website Changes: desde n/a hasta 1.2."
2023-12-20 17:00:29 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-12-26 23:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.2
} ,
2023-12-20 17:00:29 +00:00
{
"source" : "audit@patchstack.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 8.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.1 ,
"impactScore" : 4.7
}
]
} ,
"weaknesses" : [
{
"source" : "audit@patchstack.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
2023-12-26 23:00:28 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:crawlspider:seo_change_monitor:*:*:*:*:*:wordpress:*:*" ,
"versionEndExcluding" : "1.3" ,
"matchCriteriaId" : "4874DE65-AEB3-4A3F-B74E-F3C4F8F92F27"
}
]
}
]
}
] ,
2023-12-20 17:00:29 +00:00
"references" : [
{
"url" : "https://patchstack.com/database/vulnerability/seo-change-monitor/wordpress-seo-change-monitor-plugin-1-2-sql-injection-vulnerability?_s_id=cve" ,
2023-12-26 23:00:28 +00:00
"source" : "audit@patchstack.com" ,
"tags" : [
"Third Party Advisory"
]
2023-12-20 17:00:29 +00:00
}
]
}