{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1594","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-23T08:54:55.530Z","datePublished":"2023-03-23T10:00:06.079Z","dateUpdated":"2024-11-22T17:07:33.511Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T07:55:06.553Z"},"title":"novel-plus list MenuService sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"novel-plus","versions":[{"version":"3.6.2","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in novel-plus 3.6.2. Affected is the function MenuService of the file sys/menu/list. The manipulation of the argument sort leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223662 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in novel-plus 3.6.2 gefunden. Sie wurde als kritisch eingestuft. Es geht dabei um die Funktion MenuService der Datei sys/menu/list. Durch Beeinflussen des Arguments sort mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-03-23T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-23T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-23T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-13T09:39:29.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"OYyunshen (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.223662","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.223662","tags":["signature","permissions-required"]},{"url":"https://github.com/OYyunshen/Poc/blob/main/Novel-PlusV3.6.2Sqli.pdf","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:57:24.885Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.223662","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.223662","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/OYyunshen/Poc/blob/main/Novel-PlusV3.6.2Sqli.pdf","tags":["broken-link","exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-02-13T15:48:39.840685Z","id":"CVE-2023-1594","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-22T17:07:33.511Z"}}]}}