2024-09-11 18:03:18 +00:00

64 lines
2.0 KiB
JSON

{
"id": "CVE-2024-8503",
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"published": "2024-09-10T20:15:05.283",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated attacker can leverage a time-based SQL injection vulnerability in VICIdial to enumerate database records. By default, VICIdial stores plaintext credentials within the database."
},
{
"lang": "es",
"value": "Un atacante no autenticado puede aprovechar una vulnerabilidad de inyecci\u00f3n SQL basada en tiempo en VICIdial para enumerar registros de la base de datos. De manera predeterminada, VICIdial almacena credenciales de texto plano dentro de la base de datos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-011.txt",
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
},
{
"url": "https://www.vicidial.org/vicidial.php",
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
}
]
}