{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-11242","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-11-15T07:22:23.589Z","datePublished":"2024-11-15T14:31:06.459Z","dateUpdated":"2024-11-15T18:24:15.168Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-11-15T14:31:06.459Z"},"title":"ZZCMS Keyword Filtering ad_list.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"n/a","product":"ZZCMS","versions":[{"version":"2023","status":"affected"}],"modules":["Keyword Filtering"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in ZZCMS 2023. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/ad_list.php?action=pass of the component Keyword Filtering. The manipulation of the argument keyword leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Eine kritische Schwachstelle wurde in ZZCMS 2023 ausgemacht. Betroffen davon ist ein unbekannter Prozess der Datei /admin/ad_list.php?action=pass der Komponente Keyword Filtering. Durch das Beeinflussen des Arguments keyword mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-11-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-11-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-11-15T08:28:29.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"NLow6jRm5wxb3RNyziGE (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.284678","name":"VDB-284678 | ZZCMS Keyword Filtering ad_list.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.284678","name":"VDB-284678 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.442038","name":"Submit #442038 | ZZCMS 2023 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/En0t5/vul/blob/main/zzcms/zzcms-add_list-sql-inject.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"zzcms","product":"zzcms","cpes":["cpe:2.3:a:zzcms:zzcms:2023:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2023","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-15T18:23:20.952746Z","id":"CVE-2024-11242","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-15T18:24:15.168Z"}}]}}