{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5789","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-10-26T06:32:40.381Z","datePublished":"2023-10-26T16:00:08.217Z","dateUpdated":"2024-08-02T08:07:32.704Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-26T16:00:08.217Z"},"title":"Dragon Path 707GR1 Ping Diagnostics cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"Dragon Path","product":"707GR1","versions":[{"version":"20231022","status":"affected"}],"modules":["Ping Diagnostics"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in Dragon Path 707GR1 up to 20231022. Affected is an unknown function of the component Ping Diagnostics. The manipulation of the argument Host Address with the input >><img/src/onerror=alert(1)> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-243594 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in Dragon Path 707GR1 bis 20231022 entdeckt. Betroffen hiervon ist ein unbekannter Ablauf der Komponente Ping Diagnostics. Durch Beeinflussen des Arguments Host Address mit der Eingabe >><img/src/onerror=alert(1)> mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":2.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-10-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-10-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-10-26T08:37:55.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"w3bspl01t3r (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.243594","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.243594","tags":["signature","permissions-required"]},{"url":"https://drive.google.com/file/d/1s_NzD0Z6lMvRoo9sLXqRvYRaF7XTAYBE/view?usp=sharing","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"dragonpath","product":"router_707gr1_firmware","cpes":["cpe:2.3:o:dragonpath:router_707gr1_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"20231022","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-16T21:35:17.344279Z","id":"CVE-2023-5789","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-16T21:37:18.377Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:07:32.704Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.243594","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.243594","tags":["signature","permissions-required","x_transferred"]},{"url":"https://drive.google.com/file/d/1s_NzD0Z6lMvRoo9sLXqRvYRaF7XTAYBE/view?usp=sharing","tags":["exploit","x_transferred"]}]}]}}