SQL Injection vulnerability in Documize version 5.4.2, allows remote attackers to execute arbitrary code via the user parameter of the /api/dashboard/activity endpoint.
References
Link | Resource |
---|---|
https://herolab.usd.de/en/security-advisories/usd-2022-0066/ | Exploit Third Party Advisory |
Configurations
History
05 Jan 2024, 14:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:documize:documize:5.4.2:*:*:*:*:*:*:* | |
References | () https://herolab.usd.de/en/security-advisories/usd-2022-0066/ - Exploit, Third Party Advisory | |
CWE | CWE-89 | |
First Time |
Documize
Documize documize |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
29 Dec 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-29 07:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-23634
Mitre link : CVE-2023-23634
CVE.ORG link : CVE-2023-23634
JSON object : View
Products Affected
documize
- documize
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')