{"containers":{"cna":{"affected":[{"product":"PHPList","vendor":"unspecified","versions":[{"status":"affected","version":"3.2.6"}]}],"credits":[{"lang":"en","value":"Tim Coen"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in PHPList 3.2.6. It has been rated as critical. Affected by this issue is some unknown functionality of the component Subscription. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 SQL Injection","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-10T09:30:33.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Mar/45"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.98918"}],"title":"PHPList Subscription sql injection","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20032","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"PHPList Subscription sql injection"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PHPList","version":{"version_data":[{"version_value":"3.2.6"}]}}]},"vendor_name":""}]}},"credit":"Tim Coen","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in PHPList 3.2.6. It has been rated as critical. Affected by this issue is some unknown functionality of the component Subscription. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"6.3","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89 SQL Injection"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Mar/45","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Mar/45"},{"name":"https://vuldb.com/?id.98918","refsource":"MISC","url":"https://vuldb.com/?id.98918"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:25.092Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Mar/45"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.98918"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:12:16.252359Z","id":"CVE-2017-20032","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:28:07.054Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20032","datePublished":"2022-06-10T09:30:33.000Z","dateReserved":"2022-06-05T00:00:00.000Z","dateUpdated":"2025-04-15T14:28:07.054Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}