{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-38502","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-07-18T16:28:12.077Z","datePublished":"2023-07-25T21:14:22.087Z","dateUpdated":"2024-10-10T17:55:22.396Z"},"containers":{"cna":{"title":"TDengine Database Denial-of-Service","problemTypes":[{"descriptions":[{"cweId":"CWE-20","lang":"en","description":"CWE-20: Improper Input Validation","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf","tags":["x_refsource_CONFIRM"],"url":"https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf"}],"affected":[{"vendor":"taosdata","product":"TDengine","versions":[{"version":"< 3.0.7.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-07-25T21:14:22.087Z"},"descriptions":[{"lang":"en","value":"TDengine is an open source, time-series database optimized for Internet of Things devices. Prior to version 3.0.7.1, TDengine DataBase crashes on UDF nested query. This issue affects TDengine Databases which let users connect and run arbitrary queries. Version 3.0.7.1 has a patch for this issue."}],"source":{"advisory":"GHSA-w23f-r2fm-27hf","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:46:55.077Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf"}]},{"affected":[{"vendor":"tdengine","product":"tdengine","cpes":["cpe:2.3:a:tdengine:tdengine:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"3.0.7.1","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-10T17:36:52.517163Z","id":"CVE-2023-38502","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-10T17:55:22.396Z"}}]}}