{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3827","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-07-21T20:25:37.628Z","datePublished":"2023-07-22T09:00:05.183Z","dateUpdated":"2024-08-02T07:08:50.577Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-24T06:14:48.604Z"},"title":"Bug Finder Listplace Directory Listing Platform HTTP POST Request create cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"Bug Finder","product":"Listplace Directory Listing Platform","versions":[{"version":"3.0","status":"affected"}],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Bug Finder Listplace Directory Listing Platform 3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /listplace/user/ticket/create of the component HTTP POST Request Handler. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235148. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in Bug Finder Listplace Directory Listing Platform 3.0 gefunden. Sie wurde als problematisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei /listplace/user/ticket/create der Komponente HTTP POST Request Handler. Dank Manipulation des Arguments message mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-07-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-07-21T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-07-21T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-08-15T18:58:35.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"skalvin (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.235148","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.235148","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:08:50.577Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.235148","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.235148","tags":["signature","x_transferred"]}]}]}}