Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2022-25775", "assignerOrgId": "4e531c38-7a33-45d3-98dd-d909c0d8852e", "state": "PUBLISHED", "assignerShortName": "Mautic", "dateReserved": "2022-02-22T20:17:36.805Z", "datePublished": "2024-09-18T15:01:23.529Z", "dateUpdated": "2024-09-18T21:30:23.104Z"}, "containers": {"cna": {"affected": [{"collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "packageName": "mautic/core", "product": "Mautic", "repo": "https://github.com/mautic/mautic", "vendor": "Mautic", "versions": [{"lessThan": "< 4.4.12", "status": "affected", "version": ">= 2.14.1", "versionType": "semver"}, {"lessThan": "< 5.0.4", "status": "affected", "version": "> 5.0.0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "reporter", "value": "a-solovev"}, {"lang": "en", "type": "remediation developer", "value": "Lenon Leite"}, {"lang": "en", "type": "remediation developer", "value": "John Linhart"}, {"lang": "en", "type": "remediation reviewer", "value": "John Linhart"}, {"lang": "en", "type": "remediation reviewer", "value": "Akivarsha Saha"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>Prior to the patched version, logged in users of Mautic are vulnerable to an SQL injection vulnerability in the Reports bundle.</p><p>The user could retrieve and alter data like sensitive data, login, and depending on database permission the attacker can manipulate file systems.</p>"}], "value": "Prior to the patched version, logged in users of Mautic are vulnerable to an SQL injection vulnerability in the Reports bundle.\n\nThe user could retrieve and alter data like sensitive data, login, and depending on database permission the attacker can manipulate file systems."}], "impacts": [{"capecId": "CAPEC-66", "descriptions": [{"lang": "en", "value": "CAPEC-66 SQL Injection"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "4e531c38-7a33-45d3-98dd-d909c0d8852e", "shortName": "Mautic", "dateUpdated": "2024-09-18T21:30:23.104Z"}, "references": [{"url": "https://github.com/mautic/mautic/security/advisories/GHSA-jj6w-2cqg-7p94"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Update to 4.4.12 or 5.0.4 or higher."}], "value": "Update to 4.4.12 or 5.0.4 or higher."}], "source": {"advisory": "GHSA-jj6w-2cqg-7p94", "discovery": "EXTERNAL"}, "title": "SQL Injection in dynamic Reports", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"affected": [{"vendor": "mautic", "product": "mautic", "cpes": ["cpe:2.3:a:mautic:mautic:-:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "2.14.1", "status": "affected", "lessThan": "4.4.12", "versionType": "semver"}, {"version": "5.0.0", "status": "affected", "lessThan": "5.0.4", "versionType": "semver"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-18T17:46:22.968034Z", "id": "CVE-2022-25775", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-18T17:47:36.323Z"}}]}}