visegripped Stracker api.php getHistory symbol/startDate/endDate SQL Injection

Gaskiya vulnerability da aka ware a matsayin kura an samu a visegripped Stracker. Hakika, aikin getHistory ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil doc_root/public_html/stracker/api.php, a cikin sashen $software_component. A sa manipulation of the argument symbol/startDate/endDate ka SQL Injection. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-89. Hakika, rauni an bayyana shi 01/14/2023 kamar 16. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2022-4889. Ana bukatar samun damar shiga local network ɗin don wannan hari ya yi nasara. Tekinikal faɗi ga. Babu exploit ɗin da ake samu. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu a wondi feere. 0-day shima, an ndiyam a wuro be $0-$5k. Ana kiran patch ɗin da 63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a. Gyaran matsalar yana nan a shirye don saukewa a github.com. Ana shawartar a saka patch domin warware wannan matsala. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

3 Goyarwa · 73 Datenpunkte

FurɗeSúgá
01/14/2023 18:21
Gargadi 1/2
02/07/2023 14:54
Gargadi 2/2
02/07/2023 14:56
software_vendorvisegrippedvisegrippedvisegripped
software_nameStrackerStrackerStracker
software_filedoc_root/public_html/stracker/api.phpdoc_root/public_html/stracker/api.phpdoc_root/public_html/stracker/api.php
software_functiongetHistorygetHistorygetHistory
software_argumentsymbol/startDate/endDatesymbol/startDate/endDatesymbol/startDate/endDate
vulnerability_cweCWE-89 (SQL Injection)CWE-89 (SQL Injection)CWE-89 (SQL Injection)
vulnerability_risk222
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
advisory_identifier161616
advisory_urlhttps://github.com/visegripped/stracker/pull/16https://github.com/visegripped/stracker/pull/16https://github.com/visegripped/stracker/pull/16
countermeasure_nameKariKariKari
patch_name63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a
countermeasure_patch_urlhttps://github.com/visegripped/stracker/commit/63e1b040373ee5b6c7d1e165ecf5ae1603d29e0ahttps://github.com/visegripped/stracker/commit/63e1b040373ee5b6c7d1e165ecf5ae1603d29e0ahttps://github.com/visegripped/stracker/commit/63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a
countermeasure_advisoryquoteFix date query and protect against sql injectionFix date query and protect against sql injectionFix date query and protect against sql injection
source_cveCVE-2022-4889CVE-2022-4889CVE-2022-4889
cna_responsibleVulDBVulDBVulDB
advisory_date1673650800 (01/14/2023)1673650800 (01/14/2023)1673650800 (01/14/2023)
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_avAAA
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_avAAA
cvss3_vuldb_prLLL
cvss3_vuldb_eXXX
cvss2_vuldb_basescore5.25.25.2
cvss2_vuldb_tempscore4.54.54.5
cvss3_vuldb_basescore5.55.55.5
cvss3_vuldb_tempscore5.35.35.3
cvss3_meta_basescore5.55.56.9
cvss3_meta_tempscore5.35.36.9
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1673650800 (01/14/2023)1673650800 (01/14/2023)
cve_nvd_summaryA vulnerability classified as critical was found in visegripped Stracker. Affected by this vulnerability is the function getHistory of the file doc_root/public_html/stracker/api.php. The manipulation of the argument symbol/startDate/endDate leads to sql injection. The name of the patch is 63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a. It is recommended to apply a patch to fix this issue. The identifier VDB-218377 was assigned to this vulnerability.A vulnerability classified as critical was found in visegripped Stracker. Affected by this vulnerability is the function getHistory of the file doc_root/public_html/stracker/api.php. The manipulation of the argument symbol/startDate/endDate leads to sql injection. The name of the patch is 63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a. It is recommended to apply a patch to fix this issue. The identifier VDB-218377 was assigned to this vulnerability.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avA
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avA
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore5.2
cvss3_nvd_basescore9.8
cvss3_cna_basescore5.5

Want to stay up to date on a daily basis?

Enable the mail alert feature now!