{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-2113","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-03-08T07:24:32.369Z","datePublished":"2025-03-09T03:00:12.023Z","dateUpdated":"2025-03-10T15:51:10.532Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-09T03:00:12.023Z"},"title":"AT Software Solutions ATSVD Esqueceu a senha sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"AT Software Solutions","product":"ATSVD","versions":[{"version":"3.4.0","status":"affected"},{"version":"3.4.1","status":"affected"}],"modules":["Esqueceu a senha"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in AT Software Solutions ATSVD up to 3.4.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component Esqueceu a senha. The manipulation of the argument txtCPF leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.4.2 is able to address this issue. It is recommended to upgrade the affected component."},{"lang":"de","value":"Eine kritische Schwachstelle wurde in AT Software Solutions ATSVD bis 3.4.1 ausgemacht. Es geht hierbei um eine nicht näher spezifizierte Funktion der Komponente Esqueceu a senha. Durch Manipulation des Arguments txtCPF mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 3.4.2 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-03-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-03-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-08T08:43:40.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"y4g0 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.299006","name":"VDB-299006 | AT Software Solutions ATSVD Esqueceu a senha sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.299006","name":"VDB-299006 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.506341","name":"Submit #506341 | AT Software Solutions ATSVD  < 3.4.2 Blind Boolean-Based SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/yago3008/cves","tags":["related"]}]},"adp":[{"references":[{"url":"https://vuldb.com/?submit.506341","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-10T15:51:06.790514Z","id":"CVE-2025-2113","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-10T15:51:10.532Z"}}]}}