{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-7148","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-28T08:47:47.371Z","datePublished":"2023-12-29T03:00:06.142Z","dateUpdated":"2024-08-02T08:50:08.195Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-12-29T03:00:06.142Z"},"title":"ShifuML shifu Java Expression Language DataPurifier.java code injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Code Injection"}]}],"affected":[{"vendor":"ShifuML","product":"shifu","versions":[{"version":"0.12.0","status":"affected"}],"modules":["Java Expression Language Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in ShifuML shifu 0.12.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file src/main/java/ml/shifu/shifu/core/DataPurifier.java of the component Java Expression Language Handler. The manipulation of the argument FilterExpression leads to code injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249151."},{"lang":"de","value":"In ShifuML shifu 0.12.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Das betrifft eine unbekannte Funktionalität der Datei src/main/java/ml/shifu/shifu/core/DataPurifier.java der Komponente Java Expression Language Handler. Dank Manipulation des Arguments FilterExpression mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.1,"vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-12-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-28T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-12-28T09:53:12.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"w3bspl01t3r (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.249151","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.249151","tags":["signature","permissions-required"]},{"url":"https://drive.google.com/file/d/1ST3dD-iwUBgBNZ8tGaBbqVi1zRh5rLND/view","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:50:08.195Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.249151","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.249151","tags":["signature","permissions-required","x_transferred"]},{"url":"https://drive.google.com/file/d/1ST3dD-iwUBgBNZ8tGaBbqVi1zRh5rLND/view","tags":["exploit","x_transferred"]}]}]}}