{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5016","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-09-16T06:43:13.210Z","datePublished":"2023-09-17T02:00:06.688Z","dateUpdated":"2024-08-02T07:44:53.706Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T08:02:34.960Z"},"title":"spider-flow API DataSourceController.java DriverManager.getConnection deserialization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-502","lang":"en","description":"CWE-502 Deserialization"}]}],"affected":[{"vendor":"n/a","product":"spider-flow","versions":[{"version":"0.1","status":"affected"},{"version":"0.2","status":"affected"},{"version":"0.3","status":"affected"},{"version":"0.4","status":"affected"},{"version":"0.5","status":"affected"}],"modules":["API"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in spider-flow up to 0.5.0. It has been declared as critical. Affected by this vulnerability is the function DriverManager.getConnection of the file src/main/java/org/spiderflow/controller/DataSourceController.java of the component API. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239857 was assigned to this vulnerability."},{"lang":"de","value":"In spider-flow bis 0.5.0 wurde eine kritische Schwachstelle ausgemacht. Betroffen ist die Funktion DriverManager.getConnection der Datei src/main/java/org/spiderflow/controller/DataSourceController.java der Komponente API. Mit der Manipulation mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-09-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-09-16T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-09-16T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-10-12T14:07:37.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"bayuncao (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.239857","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.239857","tags":["signature","permissions-required"]},{"url":"https://github.com/bayuncao/vul-cve","tags":["broken-link"]},{"url":"https://github.com/bayuncao/vul-cve/blob/main/spider-flow%20fastjson%20jdbc%20deserialization","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:44:53.706Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.239857","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.239857","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/bayuncao/vul-cve","tags":["broken-link","x_transferred"]},{"url":"https://github.com/bayuncao/vul-cve/blob/main/spider-flow%20fastjson%20jdbc%20deserialization","tags":["broken-link","exploit","x_transferred"]}]}]}}