{"containers":{"cna":{"affected":[{"product":"Easytest","vendor":"Huachu Digital Technology Co.,Ltd.","versions":[{"status":"affected","version":"1705"}]}],"datePublic":"2021-10-15T00:00:00.000Z","descriptions":[{"lang":"en","value":"The Easytest contains SQL injection vulnerabilities. After obtaining user’s privilege, remote attackers can inject SQL commands into the parameters of the learning history page to access all database and obtain administrator permissions."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 SQL Injection","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-10-15T12:10:35.000Z","orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.twcert.org.tw/tw/cp-132-5203-00de8-1.html"}],"solutions":[{"lang":"en","value":"Update Easytest to version 2100"}],"source":{"advisory":"TVN-202110005","discovery":"EXTERNAL"},"title":"Huachu Digital Technology Co.,Ltd. Easytest - SQL Injection-1","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"AKA":"TWCERT/CC","ASSIGNER":"cve@cert.org.tw","DATE_PUBLIC":"2021-10-15T11:57:00.000Z","ID":"CVE-2021-42333","STATE":"PUBLIC","TITLE":"Huachu Digital Technology Co.,Ltd. Easytest - SQL Injection-1"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Easytest","version":{"version_data":[{"version_affected":"=","version_value":"1705"}]}}]},"vendor_name":"Huachu Digital Technology Co.,Ltd."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Easytest contains SQL injection vulnerabilities. After obtaining user’s privilege, remote attackers can inject SQL commands into the parameters of the learning history page to access all database and obtain administrator permissions."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89 SQL Injection"}]}]},"references":{"reference_data":[{"name":"https://www.twcert.org.tw/tw/cp-132-5203-00de8-1.html","refsource":"MISC","url":"https://www.twcert.org.tw/tw/cp-132-5203-00de8-1.html"}]},"solution":[{"lang":"en","value":"Update Easytest to version 2100"}],"source":{"advisory":"TVN-202110005","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T03:30:38.290Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.twcert.org.tw/tw/cp-132-5203-00de8-1.html"}]}]},"cveMetadata":{"assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","assignerShortName":"twcert","cveId":"CVE-2021-42333","datePublished":"2021-10-15T12:10:35.859Z","dateReserved":"2021-10-12T00:00:00.000Z","dateUpdated":"2024-09-16T23:56:50.380Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}