{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-4309","assignerOrgId":"9119a7d8-5eab-497f-8521-727c672e3725","state":"PUBLISHED","assignerShortName":"cisa-cg","dateReserved":"2023-08-11T16:23:07.566Z","datePublished":"2023-10-10T17:27:25.515Z","dateUpdated":"2024-09-18T18:52:15.809Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"Internet Election Service","vendor":"Election Services Co. (ESC)","versions":[{"lessThanOrEqual":"2023-08-12","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Schema"}],"datePublic":"2023-08-12T19:20:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Election Services Co. (ESC) Internet Election Service is vulnerable to SQL injection in multiple pages and parameters. These vulnerabilities allow an unauthenticated, remote attacker to read or modify data for any elections that share the same backend database. ESC deactivated older and unused elections and enabled web application firewall (WAF) protection for current and future elections on or around 2023-08-12.</span><br>"}],"value":"Election Services Co. (ESC) Internet Election Service is vulnerable to SQL injection in multiple pages and parameters. These vulnerabilities allow an unauthenticated, remote attacker to read or modify data for any elections that share the same backend database. ESC deactivated older and unused elections and enabled web application firewall (WAF) protection for current and future elections on or around 2023-08-12.\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"other":{"content":{"Automatable":"Yes","Exploitation":"PoC","Technical Impact":"Total","Value Density":"Concentrated"},"type":"SSVCv2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9119a7d8-5eab-497f-8521-727c672e3725","shortName":"cisa-cg","dateUpdated":"2023-11-22T04:49:53.048Z"},"references":[{"url":"https://schemasecurity.co/private-elections.pdf"},{"url":"https://www.youtube.com/watch?v=yeG1xZkHc64"},{"url":"https://www.electionservicesco.com/pages/services_internet.php"}],"source":{"discovery":"EXTERNAL"},"tags":["exclusively-hosted-service"],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:24:04.378Z"},"title":"CVE Program Container","references":[{"url":"https://schemasecurity.co/private-elections.pdf","tags":["x_transferred"]},{"url":"https://www.youtube.com/watch?v=yeG1xZkHc64","tags":["x_transferred"]},{"url":"https://www.electionservicesco.com/pages/services_internet.php","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-18T18:52:08.028644Z","id":"CVE-2023-4309","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-18T18:52:15.809Z"}}]}}