{"containers":{"cna":{"affected":[{"product":"PricePoint","vendor":"Navetti","versions":[{"status":"affected","version":"4.6.0.0"}]}],"credits":[{"lang":"en","value":"W. Schober"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Navetti PricePoint 4.6.0.0. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-13T06:50:26.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Mar/24"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.97864"}],"title":"Navetti PricePoint cross-site request forgery","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20045","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"Navetti PricePoint cross-site request forgery"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PricePoint","version":{"version_data":[{"version_value":"4.6.0.0"}]}}]},"vendor_name":"Navetti"}]}},"credit":"W. Schober","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in Navetti PricePoint 4.6.0.0. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"7.3","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Mar/24","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Mar/24"},{"name":"https://vuldb.com/?id.97864","refsource":"MISC","url":"https://vuldb.com/?id.97864"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:25.349Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Mar/24"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.97864"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T16:56:15.967341Z","id":"CVE-2017-20045","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:25:25.539Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20045","datePublished":"2022-06-13T06:50:26.000Z","dateReserved":"2022-06-06T00:00:00.000Z","dateUpdated":"2025-04-15T14:25:25.539Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}