Show plain JSON{"id": "CVE-2023-43794", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.2, "exploitabilityScore": 1.2}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 1.2}]}, "published": "2023-10-17T21:15:46.120", "references": [{"url": "https://github.com/nocodb/nocodb/security/advisories/GHSA-3m5q-q39v-xf8f", "tags": ["Exploit", "Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/nocodb/nocodb/security/advisories/GHSA-3m5q-q39v-xf8f", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-89"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "Nocodb is an open source Airtable alternative. Affected versions of nocodb contain a SQL injection vulnerability, that allows an authenticated attacker with creator access to query the underlying database. By supplying a specially crafted payload to the given an attacker can inject arbitrary SQL queries to be executed. Since this is a blind SQL injection, an attacker may need to use time-based payloads which would include a function to delay execution for a given number of seconds. The response time indicates, whether the result of the query execution was true or false. Depending on the result, the HTTP response will be returned after a given number of seconds, indicating TRUE, or immediately, indicating FALSE. In that way, an attacker can reveal the data present in the database. This vulnerability has been addressed in version 0.111.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-141`."}, {"lang": "es", "value": "Nocodb es una alternativa de c\u00f3digo abierto a Airtable. Las versiones afectadas de nocodb contienen una vulnerabilidad de inyecci\u00f3n SQL, que permite a un atacante autenticado con acceso de creador consultar la base de datos subyacente. Al proporcionar un payload especialmente manipulada, un atacante puede inyectar consultas SQL arbitrarias para su ejecuci\u00f3n. Dado que se trata de una inyecci\u00f3n blind SQL, es posible que un atacante necesite utilizar payloads basados en el tiempo que incluir\u00edan una funci\u00f3n para retrasar la ejecuci\u00f3n durante un n\u00famero determinado de segundos. El tiempo de respuesta indica si el resultado de la ejecuci\u00f3n de la consulta fue verdadero o falso. Dependiendo del resultado, la respuesta HTTP se devolver\u00e1 despu\u00e9s de un n\u00famero determinado de segundos, indicando VERDADERO, o inmediatamente, indicando FALSO. De esa forma, un atacante puede revelar los datos presentes en la base de datos. Esta vulnerabilidad se ha solucionado en la versi\u00f3n 0.111.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad. Este problema tambi\u00e9n se rastrea como \"GHSL-2023-141\"."}], "lastModified": "2024-11-21T08:24:47.883", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:xgenecloud:nocodb:0.109.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3193E82C-7D6C-4A7D-8DA8-F0E9F5D8ED8B"}], "operator": "OR"}]}], "sourceIdentifier": "security-advisories@github.com"}