{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5297","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-09-29T14:27:38.367Z","datePublished":"2023-09-29T21:31:05.504Z","dateUpdated":"2024-09-20T16:53:23.484Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-25T04:55:44.628Z"},"title":"Xinhu RockOA start backup","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-530","lang":"en","description":"CWE-530 Exposure of Backup File to an Unauthorized Control Sphere"}]}],"affected":[{"vendor":"Xinhu","product":"RockOA","versions":[{"version":"2.3.2","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927."},{"lang":"de","value":"Es wurde eine Schwachstelle in Xinhu RockOA 2.3.2 ausgemacht. Sie wurde als problematisch eingestuft. Es geht dabei um die Funktion start der Datei task.php?m=sys|runt&a=beifen. Mittels dem Manipulieren mit unbekannten Daten kann eine exposure of backup file to an unauthorized control sphere-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Die Komplexität eines Angriffs ist eher hoch. Sie ist schwierig auszunutzen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.7,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.7,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}}],"timeline":[{"time":"2023-09-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-09-29T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-09-29T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-10-22T14:47:33.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"magicwave18 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.240927","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.240927","tags":["signature","permissions-required"]},{"url":"https://github.com/magicwave18/vuldb/issues/2","tags":["exploit","issue-tracking"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:52:08.471Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.240927","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.240927","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/magicwave18/vuldb/issues/2","tags":["exploit","issue-tracking","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-20T16:52:32.194107Z","id":"CVE-2023-5297","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-20T16:53:23.484Z"}}]}}