{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-4708","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-09-01T12:34:19.690Z","datePublished":"2023-09-01T17:31:05.381Z","dateUpdated":"2024-10-01T13:10:01.160Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-24T15:04:46.846Z"},"title":"Infosoftbd Clcknshop GET Parameter all sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"Infosoftbd","product":"Clcknshop","versions":[{"version":"1.0.0","status":"affected"}],"modules":["GET Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Infosoftbd Clcknshop 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /collection/all of the component GET Parameter Handler. The manipulation of the argument tag leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-238571. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in Infosoftbd Clcknshop 1.0.0 ausgemacht. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei /collection/all der Komponente GET Parameter Handler. Durch die Manipulation des Arguments tag mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-09-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-09-01T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-09-01T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-09-29T12:42:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"skalvin (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.238571","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.238571","tags":["signature","permissions-required"]},{"url":"http://packetstormsecurity.com/files/174445/Clcknshop-1.0.0-SQL-Injection.html","tags":["related"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:37:59.852Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.238571","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.238571","tags":["signature","permissions-required","x_transferred"]},{"url":"http://packetstormsecurity.com/files/174445/Clcknshop-1.0.0-SQL-Injection.html","tags":["related","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-01T13:09:52.291948Z","id":"CVE-2023-4708","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-01T13:10:01.160Z"}}]}}