2023-12-28 17:00:28 +00:00
{
"id" : "CVE-2023-52082" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2023-12-28T16:16:02.290" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:39:08.010" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-28 17:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Lychee is a free photo-management tool. Prior to 5.0.2, Lychee is vulnerable to an SQL injection on any binding when using mysql/mariadb. This injection is only active for users with the `.env` settings set to DB_LOG_SQL=true and DB_LOG_SQL_EXPLAIN=true. The defaults settings of Lychee are safe. The patch is provided on version 5.0.2. To work around this issue, disable SQL EXPLAIN logging.\n"
2024-01-04 21:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "Lychee es una herramienta gratuita de gesti\u00f3n de fotograf\u00edas. Antes de 5.0.2, Lychee es vulnerable a una inyecci\u00f3n SQL en cualquier enlace cuando se usa mysql/mariadb. Esta inyecci\u00f3n solo est\u00e1 activa para usuarios con la configuraci\u00f3n `.env` configurada en DB_LOG_SQL=true y DB_LOG_SQL_EXPLAIN=true. La configuraci\u00f3n predeterminada de Lychee es segura. El parche se proporciona en la versi\u00f3n 5.0.2. Para solucionar este problema, deshabilite el registro SQL EXPLAIN."
2023-12-28 17:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-01-04 21:00:29 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
2024-01-04 21:00:29 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2024-01-04 21:00:29 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
2024-12-08 03:06:42 +00:00
"userInteraction" : "REQUIRED" ,
2024-01-04 21:00:29 +00:00
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-01-04 21:00:29 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.8 ,
2024-01-04 21:00:29 +00:00
"impactScore" : 5.9
} ,
2023-12-28 17:00:28 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-12-28 17:00:28 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-12-28 17:00:28 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
2024-12-08 03:06:42 +00:00
"userInteraction" : "NONE" ,
2023-12-28 17:00:28 +00:00
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-12-28 17:00:28 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 3.9 ,
2023-12-28 17:00:28 +00:00
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2023-12-28 17:00:28 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
2024-01-04 21:00:29 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:lycheeorg:lychee:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.9.3" ,
"versionEndExcluding" : "5.0.2" ,
"matchCriteriaId" : "28BDD1B9-7255-4D9C-B4B2-EB8D485770EE"
}
]
}
]
}
] ,
2023-12-28 17:00:28 +00:00
"references" : [
{
"url" : "https://github.com/LycheeOrg/Lychee/commit/33354a2ce7cf700cc4ee537b7b8b94dfc1e84ad4" ,
2024-01-04 21:00:29 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2023-12-28 17:00:28 +00:00
} ,
{
"url" : "https://github.com/LycheeOrg/Lychee/security/advisories/GHSA-rjwv-5j3m-p5x4" ,
2024-01-04 21:00:29 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://github.com/LycheeOrg/Lychee/commit/33354a2ce7cf700cc4ee537b7b8b94dfc1e84ad4" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://github.com/LycheeOrg/Lychee/security/advisories/GHSA-rjwv-5j3m-p5x4" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-12-28 17:00:28 +00:00
}
]
}