{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-4893","assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","state":"PUBLISHED","assignerShortName":"twcert","dateReserved":"2024-05-15T02:08:20.026Z","datePublished":"2024-05-15T02:31:29.475Z","dateUpdated":"2024-08-01T20:55:10.269Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"EasyFlow .NET","vendor":"DigiWin","versions":[{"status":"affected","version":"3.x"},{"status":"affected","version":"5.x"},{"status":"affected","version":"6.1.x"},{"lessThan":"v6.6.15","status":"affected","version":"6.6.x","versionType":"custom"}]}],"datePublic":"2024-05-15T02:17:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"DigiWin EasyFlow .NET lacks validation for certain input parameters, allowing remote attackers to inject arbitrary SQL commands. This vulnerability enables unauthorized access to read, modify, and delete database records, as well as execute system commands."}],"value":"DigiWin EasyFlow .NET lacks validation for certain input parameters, allowing remote attackers to inject arbitrary SQL commands. This vulnerability enables unauthorized access to read, modify, and delete database records, as well as execute system commands."}],"impacts":[{"capecId":"CAPEC-66","descriptions":[{"lang":"en","value":"CAPEC-66 SQL Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert","dateUpdated":"2024-06-03T09:48:43.162Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/tw/cp-132-7800-843f1-1.html"},{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/en/cp-139-7801-67d07-2.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Install patch for V3.x, V5.x and V6.1.x (released on 2023/12/30 or later).<br>Update V6.6.x to V6.6.15 or later version."}],"value":"Install patch for V3.x, V5.x and V6.1.x (released on 2023/12/30 or later).\nUpdate V6.6.x to V6.6.15 or later version."}],"source":{"advisory":"TVN-202405001","discovery":"EXTERNAL"},"title":"DigiWin EasyFlow .NET - SQL Injection","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-4893","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-05-15T14:28:12.553304Z"}}}],"affected":[{"cpes":["cpe:2.3:a:digiwin:easyflow_.net:6.6.x:*:*:*:*:*:*:*"],"vendor":"digiwin","product":"easyflow_.net","versions":[{"status":"affected","version":"6.6.x"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:digiwin:easyflow_.net:3.x:*:*:*:*:*:*:*"],"vendor":"digiwin","product":"easyflow_.net","versions":[{"status":"affected","version":"3.x"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:digiwin:easyflow_.net:5.x:*:*:*:*:*:*:*"],"vendor":"digiwin","product":"easyflow_.net","versions":[{"status":"affected","version":"5.x"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:digiwin:easyflow_.net:6.1.x:*:*:*:*:*:*:*"],"vendor":"digiwin","product":"easyflow_.net","versions":[{"status":"affected","version":"6.1.x"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:56:01.777Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T20:55:10.269Z"},"title":"CVE Program Container","references":[{"tags":["third-party-advisory","x_transferred"],"url":"https://www.twcert.org.tw/tw/cp-132-7800-843f1-1.html"},{"tags":["third-party-advisory","x_transferred"],"url":"https://www.twcert.org.tw/en/cp-139-7801-67d07-2.html"}]}]}}