2024-07-14 02:06:08 +00:00

82 lines
2.1 KiB
JSON

{
"id": "CVE-2023-36993",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-07T19:15:09.827",
"lastModified": "2023-07-13T19:30:27.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The cryptographically insecure random number generator being used in TravianZ 8.3.4 and 8.3.3 in the password reset function allows an attacker to guess the password reset.parameters and to take over accounts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-338"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:travianz_project:travianz:8.3.3:-:*:*:*:*:*:*",
"matchCriteriaId": "751F6830-1A00-44F9-BEC1-6B5AA82E474D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:travianz_project:travianz:8.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CFBD29F3-FB4D-4FF7-AF27-F9D35507CF6C"
}
]
}
]
}
],
"references": [
{
"url": "https://bramdoessecurity.com/travianz-hacked/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}