{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-33179","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-05-17T22:25:50.696Z","datePublished":"2023-05-30T20:07:13.870Z","dateUpdated":"2025-01-09T21:16:43.284Z"},"containers":{"cna":{"title":"Sensitive Information Disclosure abusing SQL Injection in Xibo CMS nameFilter","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-jmx8-cgm4-7mf5","tags":["x_refsource_CONFIRM"],"url":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-jmx8-cgm4-7mf5"},{"name":"https://claroty.com/team82/disclosure-dashboard","tags":["x_refsource_MISC"],"url":"https://claroty.com/team82/disclosure-dashboard"},{"name":"https://xibosignage.com/blog/security-advisory-2023-05/","tags":["x_refsource_MISC"],"url":"https://xibosignage.com/blog/security-advisory-2023-05/"}],"affected":[{"vendor":"xibosignage","product":"xibo-cms","versions":[{"version":">= 3.2.0, < 3.3.5","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-05-30T20:07:13.870Z"},"descriptions":[{"lang":"en","value":"Xibo is a content management system (CMS). An SQL injection vulnerability was discovered starting in version 3.2.0 and prior to version 3.3.5 in the `nameFilter` function used throughout the CMS. This allows an authenticated user to exfiltrate data from the Xibo database by injecting specially crafted values for logical operators. Users should upgrade to version 3.3.5 which fixes this issue. There are no known workarounds aside from upgrading."}],"source":{"advisory":"GHSA-jmx8-cgm4-7mf5","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T15:39:35.803Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-jmx8-cgm4-7mf5","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-jmx8-cgm4-7mf5"},{"name":"https://claroty.com/team82/disclosure-dashboard","tags":["x_refsource_MISC","x_transferred"],"url":"https://claroty.com/team82/disclosure-dashboard"},{"name":"https://xibosignage.com/blog/security-advisory-2023-05/","tags":["x_refsource_MISC","x_transferred"],"url":"https://xibosignage.com/blog/security-advisory-2023-05/"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-09T21:16:22.453820Z","id":"CVE-2023-33179","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-09T21:16:43.284Z"}}]}}