{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5378","assignerOrgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","state":"PUBLISHED","assignerShortName":"CERT-PL","dateReserved":"2023-10-04T10:45:50.683Z","datePublished":"2024-01-29T11:11:11.608Z","dateUpdated":"2025-06-17T21:29:17.036Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"MegaBIP","repo":"https://megabip.pl/pobierz/1","vendor":"Jan Syski","versions":[{"lessThanOrEqual":"4.36.2","status":"affected","version":"0","versionType":"semver"},{"lessThan":"*","status":"unaffected","version":"5.08","versionType":"semver"}]},{"defaultStatus":"affected","product":"SmodBIP","repo":"https://smod.pl/pliki/smodbip221.zip","vendor":"Jan Syski","versions":[{"lessThan":"*","status":"affected","version":"0","versionType":"custom"}]}],"datePublic":"2024-01-12T09:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper Input Validation vulnerability in  MegaBIP and already unsupported SmodBIP software allows for Stored XSS.<p>This issue affects SmodBIP in all versions and MegaBIP in versions up to 4.36.2.&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">MegaBIP 5.08 was tested and is not vulnerable. A precise range of vulnerable versions remains unknown.</span><br></p>"}],"value":"Improper Input Validation vulnerability in  MegaBIP and already unsupported SmodBIP software allows for Stored XSS.This issue affects SmodBIP in all versions and MegaBIP in versions up to 4.36.2. MegaBIP 5.08 was tested and is not vulnerable. A precise range of vulnerable versions remains unknown."}],"impacts":[{"capecId":"CAPEC-592","descriptions":[{"lang":"en","value":"CAPEC-592 Stored XSS"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","shortName":"CERT-PL","dateUpdated":"2024-10-10T15:36:09.436Z"},"references":[{"tags":["product"],"url":"https://megabip.pl/"},{"tags":["product"],"url":"https://smod.pl/"},{"tags":["third-party-advisory"],"url":"https://cert.pl/en/posts/2023/12/CVE-2023-5378"},{"tags":["third-party-advisory"],"url":"https://cert.pl/posts/2023/12/CVE-2023-5378"}],"source":{"discovery":"UNKNOWN"},"title":"Stored XSS in SmodBIP and MegaBIP","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:59:44.420Z"},"title":"CVE Program Container","references":[{"tags":["product","x_transferred"],"url":"https://megabip.pl/"},{"tags":["product","x_transferred"],"url":"https://smod.pl/"},{"tags":["third-party-advisory","x_transferred"],"url":"https://cert.pl/en/posts/2023/12/CVE-2023-5378"},{"tags":["third-party-advisory","x_transferred"],"url":"https://cert.pl/posts/2023/12/CVE-2023-5378"}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-5378","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-01-31T18:06:53.101425Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-17T21:29:17.036Z"}}]}}