{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3682","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-07-15T16:10:30.703Z","datePublished":"2023-07-15T16:31:03.234Z","dateUpdated":"2024-08-02T07:01:57.360Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T15:18:36.525Z"},"title":"Nesote Inout Blockchain EasyPayments POST Parameter getcoinaddress sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"Nesote","product":"Inout Blockchain EasyPayments","versions":[{"version":"1.0","status":"affected"}],"modules":["POST Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in Nesote Inout Blockchain EasyPayments 1.0. Affected is an unknown function of the file /index.php/payment/getcoinaddress of the component POST Parameter Handler. The manipulation of the argument coinid leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234228. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in Nesote Inout Blockchain EasyPayments 1.0 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /index.php/payment/getcoinaddress der Komponente POST Parameter Handler. Mittels dem Manipulieren des Arguments coinid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-07-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-07-15T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-07-15T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-08-06T09:19:48.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"skalvin (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.234228","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.234228","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:01:57.360Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.234228","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.234228","tags":["signature","x_transferred"]}]}]}}