2023-09-25 18:00:31 +00:00

107 lines
3.6 KiB
JSON

{
"id": "CVE-2023-43640",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-22T18:15:12.243",
"lastModified": "2023-09-25T17:38:59.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TaxonWorks is a web-based workbench designed for taxonomists and biodiversity scientists. Prior to version 0.34.0, a SQL injection vulnerability was found in TaxonWorks that allows authenticated attackers to extract arbitrary data from the TaxonWorks database (including the users table). This issue may lead to information disclosure. Version 0.34.0 contains a fix for the issue.\n"
},
{
"lang": "es",
"value": "TaxonWorks es un banco de trabajo basado en web dise\u00f1ado para tax\u00f3nomos y cient\u00edficos de la biodiversidad. Antes de la versi\u00f3n 0.34.0, se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en TaxonWorks que permit\u00eda a atacantes autenticados extraer datos arbitrarios de la base de datos de TaxonWorks (incluida la tabla de usuarios). Este problema puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n. La versi\u00f3n 0.34.0 contiene una soluci\u00f3n para el problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:speciesfilegroup:taxonworks:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.34.0",
"matchCriteriaId": "4433F93B-CC23-465C-B9A4-2F67DEFC4D6D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/SpeciesFileGroup/taxonworks/commit/a98f2dc610a541678e1e51af47659cd8b30179ae",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/SpeciesFileGroup/taxonworks/security/advisories/GHSA-m9p2-jxr6-4p6c",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}