{"containers":{"cna":{"affected":[{"product":"databasir","vendor":"vran-dev","versions":[{"status":"affected","version":"< 1.0.2"}]}],"descriptions":[{"lang":"en","value":"Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has remote code execution vulnerability. JDBC drivers are not validated prior to use and may be provided by users of the system. This can lead to code execution by any basic user who has access to the system. Users are advised to upgrade. There are no known workarounds to this issue."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20: Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-04-20T18:15:13.000Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/vran-dev/databasir/security/advisories/GHSA-5r2v-wcwh-7xmp"},{"tags":["x_refsource_MISC"],"url":"https://github.com/vran-dev/databasir/pull/103"},{"tags":["x_refsource_MISC"],"url":"https://github.com/vran-dev/databasir/commit/ca22a8fef7a31c0235b0b2951260a7819b89993b"}],"source":{"advisory":"GHSA-5r2v-wcwh-7xmp","discovery":"UNKNOWN"},"title":"Remote Code Execution in Databasir","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-24861","STATE":"PUBLIC","TITLE":"Remote Code Execution in Databasir"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"databasir","version":{"version_data":[{"version_value":"< 1.0.2"}]}}]},"vendor_name":"vran-dev"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has remote code execution vulnerability. JDBC drivers are not validated prior to use and may be provided by users of the system. This can lead to code execution by any basic user who has access to the system. Users are advised to upgrade. There are no known workarounds to this issue."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20: Improper Input Validation"}]}]},"references":{"reference_data":[{"name":"https://github.com/vran-dev/databasir/security/advisories/GHSA-5r2v-wcwh-7xmp","refsource":"CONFIRM","url":"https://github.com/vran-dev/databasir/security/advisories/GHSA-5r2v-wcwh-7xmp"},{"name":"https://github.com/vran-dev/databasir/pull/103","refsource":"MISC","url":"https://github.com/vran-dev/databasir/pull/103"},{"name":"https://github.com/vran-dev/databasir/commit/ca22a8fef7a31c0235b0b2951260a7819b89993b","refsource":"MISC","url":"https://github.com/vran-dev/databasir/commit/ca22a8fef7a31c0235b0b2951260a7819b89993b"}]},"source":{"advisory":"GHSA-5r2v-wcwh-7xmp","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T04:20:50.531Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/vran-dev/databasir/security/advisories/GHSA-5r2v-wcwh-7xmp"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/vran-dev/databasir/pull/103"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/vran-dev/databasir/commit/ca22a8fef7a31c0235b0b2951260a7819b89993b"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-22T15:43:32.224311Z","id":"CVE-2022-24861","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-22T18:14:57.028Z"}}]},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2022-24861","datePublished":"2022-04-20T18:15:13.000Z","dateReserved":"2022-02-10T00:00:00.000Z","dateUpdated":"2025-04-22T18:14:57.028Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}