{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-0698","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-01-24T09:46:10.133Z","datePublished":"2025-01-24T15:31:04.899Z","dateUpdated":"2025-02-12T20:01:19.781Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-01-24T15:31:04.899Z"},"title":"JoeyBling bootplus list sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"JoeyBling","product":"bootplus","versions":[{"version":"247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been classified as critical. Affected is an unknown function of the file /admin/sys/menu/list. The manipulation of the argument sort/order leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in JoeyBling bootplus bis 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d ausgemacht. Hiervon betroffen ist ein unbekannter Codeblock der Datei /admin/sys/menu/list. Durch Beeinflussen des Arguments sort/order mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Dieses Produkt verzichtet auf eine Versionierung und verwendet stattdessen Rolling Releases. Deshalb sind keine Details zu betroffenen oder zu aktualisierende Versionen vorhanden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-01-24T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-01-24T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-01-24T10:51:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LVZC3 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.293226","name":"VDB-293226 | JoeyBling bootplus list sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.293226","name":"VDB-293226 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.480827","name":"Submit #480827 | JoeyBling bootplus 1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/JoeyBling/bootplus/issues/19","tags":["issue-tracking"]},{"url":"https://github.com/JoeyBling/bootplus/issues/19#issue-2786879797","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-0698","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2025-01-24T16:10:16.170762Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-12T20:01:19.781Z"}}]}}